Author: bunee

“Unmasking Transparent Tribe: How a Threat Actor Disguises as YouTube to Deploy CapraRAT on Android Devices”

“Unmasking Transparent Tribe: How a Threat Actor Disguises as YouTube to Deploy CapraRAT on Android Devices”

Transparent Tribe Mimics YouTube to Spread CapraRAT: A Sneaky Android Trojan Tale Main Points Suspected Pakistan-affiliated threat actor, Transparent Tribe, uses malicious Android apps imitating YouTube to spread CapraRAT mobile remote access trojan (RAT). CapraRAT serves as a highly intrusive tool providing the attacker control over a bulk of data on infected Android devices, as

Read More
“Major Microsoft Data Leak: Response, Repair and Lessons Learned”

“Major Microsoft Data Leak: Response, Repair and Lessons Learned”

Microsoft Patches Major Data Leak – Microsoft corrected a massive security oversight that resulted in the exposure of 38 terabytes of private data. – The leak was found in the company’s AI GitHub repository. – The failure occurred unintentionally when open-source training data was released. – The released information also featured a disk backup from

Read More
Unmasking AMBERSQUID: Exploiting Uncommon AWS Services for Cryptocurrency Mining

Unmasking AMBERSQUID: Exploiting Uncommon AWS Services for Cryptocurrency Mining

Main Points: – AMBERSQUID is a new cloud-native cryptojacking operation targeting uncommon AWS offerings like AWS Amplify, AWS Fargate, and Amazon SageMaker for illegal cryptocurrency mining. – AMBERSQUID’s activity has been spotted and named by Sysdig, a security firm specializing in cloud and container security. – Interestingly, AMBERSQUID managed to exploit these services without tripping

Read More
“Unmasking Hook: The Android Banking Trojan Born from ERMAC’s Legacy”

“Unmasking Hook: The Android Banking Trojan Born from ERMAC’s Legacy”

New Analysis Reveals Android Banking Trojan ‘Hook’ Based On ‘ERMAC’ The Android banking Trojan called ‘Hook’ is discovered to be based on its precursor, ‘ERMAC’. This revelation is a result of an analysis conducted by NCC Group’s Security Researchers. All commands (totalling 30) that could be sent to an ERMAC-infected device can also control a

Read More
“Unmasking the Flaw in MFA and PAM Security Systems Deployment: A Comprehensive Study”

“Unmasking the Flaw in MFA and PAM Security Systems Deployment: A Comprehensive Study”

Summary of Tech Article: The Security Systems Flaw A new report by Osterman Research, commissioned by Silverfort, reveals a flaw in the deployment of Multi-Factor Authentication (MFA) and Privileged Access Management (PAM) solutions. These solutions are not being comprehensively deployed enough to provide resilience to identity-based threats. Failing to deploy these systems comprehensively can lead

Read More
“Unmasking the Dark Pattern: How Retool’s Data Breach Exposed Google’s Cloud Sync Weakness”

“Unmasking the Dark Pattern: How Retool’s Data Breach Exposed Google’s Cloud Sync Weakness”

– Retool, a software development company, fell victim to a social engineering attack leading to a breach of 27 cloud accounts. – The San Francisco firm pointed fingers at a newly introduced Google Account cloud synchronization feature which was launched in April 2023, amplifying the breach. – Retool labelled this Google feature a ‘dark pattern’.

Read More
UNC3944 Shifts Tactics: The Rise of Ransomware Attacks and What It Means for Western Businesses

UNC3944 Shifts Tactics: The Rise of Ransomware Attacks and What It Means for Western Businesses

Cyber Bandit UNC3944 Sails to Ransomware Territory The cyber threat actor UNC3944 is shifting focus to ransomware deployment as a fresh revenue churning strategy. This change signals a stronger inclination towards pilfering large volumes of sensitive data for extortion. UNC3944 appears to have a firm grasp of Western business practices, suggesting a geographic connection to

Read More
“Lazarus Group’s $240 Million Crypto Heist: Analysis and Implications for Digital Security”

“Lazarus Group’s $240 Million Crypto Heist: Analysis and Implications for Digital Security”

The Cryptocurrency Plot Thickens: Lazarus Group Nabs $240m The Lazarus Group, linked with North Korea, has reportedly stolen a whopping $240 million in cryptocurrency since June 2023. Sources like Certik, Elliptic, and ZachXBT suspect the notorious hacking group stole $31 million in digital assets from the CoinEx exchange on September 12, 2023. The thefts from

Read More
TikTok Slapped with Massive GDPR Fine: Unpacking the Child Data Misuse Scandal

TikTok Slapped with Massive GDPR Fine: Unpacking the Child Data Misuse Scandal

Bite-Sized Trouble: TikTok Faced with Hefty GDPR Fine Over Child Data Misuse Major Points of the Story: TikTok handed a €345 million (about $368 million) penalty by the Irish Data Protection Commission (DPC). The fine follows a violation of the European Union’s General Data Protection Regulation (GDPR) in relation to TikTok’s misuse of children’s data.

Read More
“Google Tackles Critical Chrome Bug: A Deep Dive into CVE-2023-4863 Patching”

“Google Tackles Critical Chrome Bug: A Deep Dive into CVE-2023-4863 Patching”

Google Patches Exploited Critical Bug in Chrome Browser Google has recently rolled out an out-of-band security patch to fix a significant security breach that was being exploited in Chrome. A heap buffer overflow issue, tracked as CVE-2023-4863, has been found in the WebP image format, which could lead to arbitrary code execution or a browser

Read More
0

Your Cart Is Empty

No products in the cart.