Summary: The content discusses the decline in activity of the Predator spyware group, indicating that sanctions and exposure have impacted their operations.
Threat Actor: Predator spyware group | Predator spyware …
Summary: The content discusses the decline in activity of the Predator spyware group, indicating that sanctions and exposure have impacted their operations.
Threat Actor: Predator spyware group | Predator spyware …
Summary: This content explains what overlays are, particularly on Android devices, and how cybercriminals use them to deceive users.
Threat Actor: Cybercriminals | cybercriminals Victim: Android device users | Android …
Summary: The content discusses the alarming increase in vulnerabilities across all enterprise software categories and emphasizes the need for alternative approaches to vulnerability monitoring due to delays in associating Common …
Summary: Threat actors are increasingly targeting load balancers, leading to a record exploitation rate for this category of devices over a three-year period.
Threat Actor: Unknown | Unknown Victim: Load …
Summary: China’s cybersecurity experts have become dominant players in global capture-the-flag competitions, exploit contests, and bug bounty programs, and the Chinese government is using their expertise to strengthen the nation’s …
The Hi-Tech Crime Trends report by Group-IB highlights a growing cybercriminal focus on Apple devices due to their increasing popularity. This shift has led to a rise in malware …
ESET researchers have identified five campaigns targeting Android users with trojanized apps. Most probably carried out by the Arid Viper APT group, these campaigns started in 2022 and three of …
Summary: This content discusses five cyber espionage campaigns targeting Android users in Egypt and Palestine, attributed to the Arid Viper hacking group.
Threat Actor: Arid Viper | Arid Viper Victim: …
Threat Actor: Hackers | Hackers Victim: Apple | Apple Price: Not specified Exfiltrated Data Type: iPhone iOS source code
Additional Information:
The leaked iBoot code may be exploited by hackers…Summary: Attackers have exploited a zero-day vulnerability in TikTok’s direct messages feature to hijack high-profile accounts belonging to companies and celebrities, including Sony, CNN, and Paris Hilton.
Threat Actor: Unknown …
IT threat evolution Q1 2024 IT threat evolution Q1 2024. Mobile statistics IT threat evolution Q1 2024. Non-mobile statistics
Targeted attacks Operation Triangulation: the final mysteryLast June, we published …
Summary: Researchers have discovered a macOS version of the LightSpy spyware that has been active since January 2024, with threat actors using publicly available exploits to deliver the spyware and …
In October 2023 we posted our research about the notorious surveillance framework LightSpy2. In our research, we proved with a high degree of confidence that both implants for Android and …
Summary: This article discusses concerns about the privacy of library reading material and how it relates to targeted advertising.
Threat Actor: Advertising platforms
Victim: Library users
Key Point :
An…Summary: A new banking Trojan called Antidot has been discovered by Cyble Research and Intelligence Labs, targeting Android devices with sophisticated malware features.
Threat Actor: Antidot Trojan | Antidot Trojan …
Summary: Apple and Google have announced an industry specification for Bluetooth tracking devices that will alert users to unwanted tracking.
Threat Actor: Unwanted tracking | unwanted tracking Victim: Users | …
Summary: Apple has released security updates to fix a zero-day vulnerability in the Safari web browser that was exploited during the Pwn2Own Vancouver hacking competition.
Threat Actor: Manfred Paul | …
Summary: Apple has backported security patches to older iPhones and iPads, fixing an iOS zero-day vulnerability that was actively exploited in attacks.
Threat Actor: Unknown | Unknown Victim: Apple | …
Summary: This content discusses the features and updates of Nmap, a free and open-source tool used for network discovery and security auditing.
Threat Actor: N/A
Victim: N/A
Key Point:
Nmap…Infostealers targeting macOS devices have been on the rise for well over a year now, with variants such as Atomic Stealer (Amos), RealStealer (Realst), MetaStealer and others widely distributed in …
On April 24, 2024, we found a previously undetected malicious Mach-O binary programmed to behave like a cross between spyware and an infostealer. We have named the malware Cuckoo, after …
On April 11, 2024, BlackBerry released a new blog detailing a new VirusTotal upload of the LightSpy mobile spyware framework. BlackBerry stated that this malware was an iOS implant, yet …
This cyber security advisory is intended for IT professionals and managers within government and all sectors.
Effective DateThis publication takes effect on April 24, 2024
Revision History First…Threat Actor: Chinese keyboard apps | Chinese keyboard apps Victim: Users of Baidu, Tencent, iFlytek, Honor, Huawei, OPPO, Vivo, Samsung, Xiaomi | users of Chinese keyboard apps Price: Not specified …
Threat Actor: Unknown | Unknown Victim: Chinese iPhone and Huawei Users | Chinese iPhone and Huawei Users Price: $6200 for iPhone dataset, $1300 for Huawei dataset Exfiltrated Data Type: Personal …
Threat Actor: Alleged Threat Actor | Alleged Threat Actor Victim: iOS users | iOS users Price: Not disclosed Exfiltrated Data Type: Not specified
Additional Information :
The threat actor claims…Threat Actor: Unknown | Unknown Victim: WhatsApp users | WhatsApp Price: Not specified Exfiltrated Data Type: Not specified
Additional Information:
The threat actor claims to have a zero-day exploit for…In early 2024, Group-IB’s Threat Intelligence team observed a surge in phishing URLs targeting INTERAC, a Canadian payment service. Subsequently, a client operating in Canada reported an uptick in phishing attempts against …
New research from Recorded Futures Insikt Group focuses on the growing threat of a possible "mobile NotPetya" event. Through zero-click exploits, a self-propagating mobile malware could infiltrate smartphones at scale. …
TransparentTribe primarily targets Indian government organizations, military personnel, and defense contractors. Its objective is usually to gather sensitive information, conduct cyber espionage, and compromise the security of its targets.
TransparentTribe …
Password-manager LastPass users were recently targeted by a convincing phishing campaign that used a combination of email, SMS, and voice calls to trick targets into divulging their …
This report details the resurgence of the LightSpy mobile espionage campaign, which focuses on targets in Southern Asia and probably India, potentially indicating a renewed focus on political targets and tensions …
Summary: Cybersecurity researchers have discovered a renewed cyber espionage campaign targeting users in South Asia with the aim of delivering an Apple iOS spyware implant called LightSpy.
Threat Actor: LightSpy …
Summary: The first three months of 2024 saw a significant increase in publicly reported data compromises, with cyber-attacks being the main cause of these incidents. Supply chain attacks also continue …
Threat Actor: Unknown | Unknown Victim: Android and iOS device users | Android and iOS device users Price: Not specified Exfiltrated Data Type: Not specified
Additional Information:
The threat actor…Summary: This article discusses a bug in Elon Musk’s social media platform, X, where URLs containing the word “Twitter” were automatically changed to “X” links, potentially leading to security vulnerabilities …
Open-source software’s adaptive nature ensures its durability, relevance, and compatibility with new technologies.
When I started digging deeper into the open-source cybersecurity ecosystem, I discovered an engaged community of developers …
____________________ Summary: Google’s latest research shows a significant increase in zero-day vulnerabilities exploited by attackers in enterprise-specific software and appliances compared to previous years.
Key Point 🛡️: – The number …
Summary : Cisco released patches to address high-severity flaws in IOS and IOS XE software, including vulnerabilities that could lead to denial-of-service attacks.
Key Point : 🔒 CVE-2024-20311 – Vulnerability …
Chinese-language Phishing-as-a-Service platform ‘darcula’ targets organizations in 100+ countries with sophisticated techniques using more than 20,000 phishing domains
‘darcula’ [sic] is a new, sophisticated Phishing-as-a-Service (PhaaS) platform used on more …
Summary : The article discusses how hackers are targeting high-risk individuals’ personal accounts as corporate accounts become more secure. It provides recommendations from cybersecurity experts to counter such attacks.
Key …
Ransomware, a phenomenon now very well known, serves one ultimate and obvious purpose:
Monetary gain for the cybercriminal(s).However, multiple scenarios are, in fact, possible. Consider any and all of …
Researchers disclosed vulnerabilities today that impact 3 million Saflok electronic RFID locks deployed in 13,000 hotels and homes worldwide, allowing the researchers to easily unlock any door in a hotel by …
Key Points
ReliaQuest has observed 246% more business email compromise (BEC) attempts over the past year; this highlights the growing risk of fraud or other damage caused by cyber attacks,…Malware for mobile devices is something we come across very often. In 2023, our technologies blocked 33.8 million malware, adware, and riskware attacks on mobile devices. One of 2023’s …