Tag: SPYWARE
Keypoints :
Malware is software developed to harm computer systems, steal data, or gain unauthorized access.…Threat Actor: Unknown | unknown Victim: SAP | SAP
Key Point :
Two critical vulnerabilities (CVE-2025-0070 and CVE-2025-0066) could allow attackers to steal credentials and read decrypted information.…Keypoints :
Acting as a Cyber Threat Intelligence Analyst at PandaProbe Intelligence.…Threat Actor: Russian Intelligence | Russian Intelligence Victim: Citizens of Belarus, Kazakhstan, Kyrgyzstan, Uzbekistan, Cuba, and Nicaragua | citizens of Belarus, Kazakhstan, Kyrgyzstan, Uzbekistan, Cuba, and Nicaragua
Key Point :
Acquisition of SORM technology by multiple governments enhances their ability to wiretap citizens.…Threat Actor: Russian Developers | Russian Developers Victim: macOS Users | macOS Users
Key Point :
Banshee can collect sensitive data including passwords, system information, and cryptocurrency wallet details.…Threat Actor: Unknown | unknown Victim: Google Android Users | Google Android Users
Key Point :
Five critical vulnerabilities could lead to remote code execution on multiple Android versions.…In an increasingly complex digital landscape, the emergence of various types of malware continues to be a significant concern for internet users. One such malware that has recently captured widespread attention is EAGERBEE. Known for its sophisticated capabilities, EAGERBEE has become a hot topic among researchers and cybersecurity professionals alike.…
Threat Actor: Unknown | FireScam Victim: Individuals and organizations | Android users
Key Point :
FireScam uses a phishing site to deliver a malicious version of Telegram Premium.…Mongolia is experiencing an alarming increase in ransomware attacks, as highlighted by recent data from Ransom Monitor. Multiple domains, including government and healthcare services, have fallen victim to notorious threat actors such as funksec and darkvault. This escalating threat underscores the urgent need for enhanced cybersecurity measures across the nation.…
Threat Actor: Unknown | FireScam Victim: Android Users | Android Users
Key Point :
FireScam is distributed via a phishing website that mimics the RuStore application store.…In an increasingly connected digital era, macOS has become an enticing target for cybercriminals. From exploiting vulnerabilities that allow malicious applications to access sensitive data without user consent to sophisticated malware attacks targeting cryptocurrency assets, these threats underscore the importance of security awareness.
This article will explore recent incidents, including TCC-based vulnerabilities, attacks by APT groups, and malware specifically targeting macOS users, as well as essential protective measures that users should take to safeguard their personal data and devices from these emerging threats.…
Summary: This week’s cybersecurity update highlights significant threats and vulnerabilities impacting various sectors, emphasizing the need for vigilance and proactive measures to safeguard digital environments. Key developments include high-severity flaws, emerging malware, and notable cybercrime incidents involving threat actors.
Threat Actor: TraderTraitor | TraderTraitor Victim: DMM Bitcoin | DMM Bitcoin
Key Point :
High-severity PAN-OS flaw could lead to denial-of-service attacks on vulnerable devices.…Keypoints :
FireScam is an information-stealing malware with spyware capabilities.…