Summary: The content discusses the decline in activity of the Predator spyware group, indicating that sanctions and exposure have impacted their operations.
Threat Actor: Predator spyware group | Predator spyware …
Summary: The content discusses the decline in activity of the Predator spyware group, indicating that sanctions and exposure have impacted their operations.
Threat Actor: Predator spyware group | Predator spyware …
Summary: A popular dependency manager for Apple apps, CocoaPods, has been found to have serious vulnerabilities, making it a prime target for hackers.
Threat Actor: Hackers targeting the CocoaPods platform.…
IntelBroker, a notorious figure known for orchestrating high-profile cyberattacks, operates within BreachForums. Specializing in identifying and selling access to compromised systems, sensitive data leaks, and possibly extortion, IntelBroker facilitates various …
Summary: This content discusses the extradition of a fraudster from Ukraine to the United States who is facing charges of wire fraud and fraudulent use of an unauthorized access device.…
Summary: Apple has released a firmware update for AirPods to address an authentication issue that could allow unauthorized access to the headphones, potentially enabling eavesdropping on private conversations.
Threat Actor: …
Threat Actor: Unknown | Unknown Victim: Hey You (heyyou.com.au) | Hey You Price: Not mentioned Exfiltrated Data Type: Full names, emails, phone numbers, addresses, usernames, passwords, customer ID, user ID, …
Summary: This article discusses the use of popular online services, such as Pastebin, by malware developers to obfuscate their command and control (C2) server locations and evade detection.
Threat Actor: …
Summary: Security startup PQShield has raised $37 million in funding to build hardware and systems based on its “post-quantum” cryptography solutions, which are designed to withstand attacks from powerful quantum …
Summary: The content discusses the alarming increase in vulnerabilities across all enterprise software categories and emphasizes the need for alternative approaches to vulnerability monitoring due to delays in associating Common …
Summary: China’s cybersecurity experts have become dominant players in global capture-the-flag competitions, exploit contests, and bug bounty programs, and the Chinese government is using their expertise to strengthen the nation’s …
Summary: Microsoft has announced new cybersecurity enhancements for Outlook personal email accounts, including the deprecation of basic authentication and the end of support for certain apps and features.
Threat Actor: …
Summary: Amazon Web Services (AWS) has introduced FIDO2 passkeys as a new method for multi-factor authentication (MFA) to enhance account security and usability.
Threat Actor: No specific threat actor identified.…
The Hi-Tech Crime Trends report by Group-IB highlights a growing cybercriminal focus on Apple devices due to their increasing popularity. This shift has led to a rise in malware …
Summary: This content discusses Apple security updates and provides information about recent releases and vulnerabilities.
Threat Actor: None
Victim: None
Key Point :
Apple doesn’t disclose, discuss, or confirm security…Threat Actor: Hackers | Hackers Victim: Apple | Apple Price: Not specified Exfiltrated Data Type: iPhone iOS source code
Additional Information:
The leaked iBoot code may be exploited by hackers…This staggering amount underscores the imminent need for cyber security to be treated as a global priority. Moreover, with the explosion …
IT threat evolution Q1 2024 IT threat evolution Q1 2024. Mobile statistics IT threat evolution Q1 2024. Non-mobile statistics
Targeted attacks Operation Triangulation: the final mysteryLast June, we published …
Summary: Independent journalists and opposition activists in Europe, who have faced threats from Russia or Belarus, have been targeted or infected with the Pegasus spyware.
Threat Actor: NSO Group | …
Authored by Dexter Shin
Many government agencies provide their services online for the convenience of their citizens. Also, if this service could be provided through a mobile app, it would …
Early in May 2024, S2 Grupo’s intelligence unit, Lab52, detected a new phishing campaign in which attackers impersonated the Colombian Attorney General’s Office. The attack aims to infect victims’ systems …
In October 2023 we posted our research about the notorious surveillance framework LightSpy2. In our research, we proved with a high degree of confidence that both implants for Android and …
CryptoChameleon is a phishing kit first discovered in February 2024. As of publication, the identity of CryptoChameleon’s creator remains elusive.
The kit is used by unknown threat actors to harvest …
What happened
Proofpoint recently identified a cluster of activity conducting malicious email campaigns using piano-themed messages to lure people into advance fee fraud (AFF) scams. The campaigns have occurred since …
Summary: This content discusses how Apple’s Wi-Fi Positioning System (WPS) can be exploited for mass surveillance, even for individuals who do not own Apple devices.
Threat Actor: Apple | Apple …
Summary: Scammers are selling counterfeit code of the NSO Group’s Pegasus spyware, taking advantage of its notoriety for financial gain.
Threat Actor: Scammers selling counterfeit code advertised as the NSO …
Summary: Zoom has introduced post-quantum end-to-end encryption (E2EE) for video conferencing, making it the first UCaaS company to offer such a solution.
Threat Actor: N/A
Victim: N/A
Key Point :…
Summary: A new banking Trojan called Antidot has been discovered by Cyble Research and Intelligence Labs, targeting Android devices with sophisticated malware features.
Threat Actor: Antidot Trojan | Antidot Trojan …
Email forensics involves the examination, extraction, and analysis of email data to gather digital evidence crucial for resolving crimes and specific incidents, ensuring the integrity of the …
Summary: Apple and Google have announced an industry specification for Bluetooth tracking devices that will alert users to unwanted tracking.
Threat Actor: Unwanted tracking | unwanted tracking Victim: Users | …
Summary: Apple has released security updates to fix a zero-day vulnerability in the Safari web browser that was exploited during the Pwn2Own Vancouver hacking competition.
Threat Actor: Manfred Paul | …
Summary: Apple has backported security patches to older iPhones and iPads, fixing an iOS zero-day vulnerability that was actively exploited in attacks.
Threat Actor: Unknown | Unknown Victim: Apple | …
Infostealers targeting macOS devices have been on the rise for well over a year now, with variants such as Atomic Stealer (Amos), RealStealer (Realst), MetaStealer and others widely distributed in …
Bleeping Computer recently reported that a phishing-as-a-service (PhaaS) available in cybercriminal forums dubbed “Typhoon 2FA” has the ability to compromise Microsoft 365 and Google accounts even if users have two-factor …
Summary: A new malware called “Cuckoo” has been discovered, targeting macOS users by disguising itself as a music converter app like Spotify.
Threat Actor: Cuckoo | Cuckoo Victim: macOS users …
Summary: Finland’s Transport and Communications Agency (Traficom) has warned about an ongoing Android malware campaign that targets online bank accounts. Scammers send SMS messages instructing recipients to call a number …
Summary: Researchers have found that the Cybersecurity and Infrastructure Security Agency’s Known Exploited Vulnerabilities (KEV) catalog is having a positive impact on organizations by helping them patch vulnerabilities faster.
Threat …
Summary: This content discusses the continued relevance of passwords in digital authentication despite the availability of alternative methods, such as passkeys.
Threat Actor: N/A
Victim: N/A
Key Point :
The…It’s been little more than a week since Apple rolled out an unprecedented 74 new rules to its XProtect malware signature list in version 2192. A further 10 rules were …
On April 24, 2024, we found a previously undetected malicious Mach-O binary programmed to behave like a cross between spyware and an infostealer. We have named the malware Cuckoo, after …
On April 11, 2024, BlackBerry released a new blog detailing a new VirusTotal upload of the LightSpy mobile spyware framework. BlackBerry stated that this malware was an iOS implant, yet …
Threat Actor: Unknown | Unknown Victim: Apple, Samsung, and 100+ Companies | Apple, Samsung, and 100+ Companies Price: $14,500 (initially) + $3,000 (demonstration) Exfiltrated Data Type: Customer information from purchases …
Threat Actor: Chinese keyboard apps | Chinese keyboard apps Victim: Users of Baidu, Tencent, iFlytek, Honor, Huawei, OPPO, Vivo, Samsung, Xiaomi | users of Chinese keyboard apps Price: Not specified …
Threat Actor: Alleged Threat Actor | Alleged Threat Actor Victim: iOS users | iOS users Price: Not disclosed Exfiltrated Data Type: Not specified
Additional Information :
The threat actor claims…In early 2024, Group-IB’s Threat Intelligence team observed a surge in phishing URLs targeting INTERAC, a Canadian payment service. Subsequently, a client operating in Canada reported an uptick in phishing attempts against …
Amibreached.com is a service developed by Cyble Inc., designed to help individuals and companies determine if their personal data has been exposed on the dark web. The platform allows users …
Welcome to Picus Security‘s weekly cyber threat intelligence roundup! …
This report details the resurgence of the LightSpy mobile espionage campaign, which focuses on targets in Southern Asia and probably India, potentially indicating a renewed focus on political targets and tensions …
Summary: Microsoft was the most impersonated brand in brand phishing attacks in Q1 2024, followed by Google and LinkedIn. Cybercriminals continuously evolve their phishing lures based on various factors, such …