by | Jun 29, 2023 | Uncategorized
Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal sensitive data associated with thousands of Android users. “As a result of the attack, the criminals gained access to email addresses,...
by | Jun 29, 2023 | Uncategorized
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in attacks exploiting the Log4j Log4Shell vulnerability last year. “Andariel infects machines by executing a Log4j exploit, which, in turn,...
by | Jun 29, 2023 | Uncategorized
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure – especially when combined with AI. But AI is only as good as the data feeding it. Access to unique, underground sources is key. Threat...
by | Jun 29, 2023 | Uncategorized
Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse. The malware “represents a significant shift as it incorporates the malicious components directly within the Flutter code,” Fortinet FortiGuard Labs...
by | Jun 29, 2023 | Uncategorized
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that’s been put to use by the actor since 2021. Evidence shows that the custom made, actively developed framework has...