CactusPete APT Hones Toolset, Resurfaces with New Espionage Targets
The APT is becoming more sophisticated over time.
The APT is becoming more sophisticated over time.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Oh dear, oh dear, today has been very exciting for Fortnite fans. Apple has banned the game from the App Store, and developer Epic Games has now retaliated with a lawsuit. Even that’s not doing the acidity of this feud between the two justice. And now Google has also banned Fortnite from the Google Play Store. What the heck…
A never before seen malware has been used for espionage purposes via Linux systems, warn the NSA and FBI in a joint advisory.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
A revamped version of England‘s troubled contact-tracing app is beginning trials today, but the new system has got problems of its own. The app uses Bluetooth to detect if people have recently been close to someone who’s tested positive for COVID-19. The government says the system’s “designed with user privacy in mind so it tracks…
A team of academic researchers—who previously made the headlines earlier this year for uncovering severe security issues in the 4G LTE and 5G networks—today presented a new attack called ‘ReVoLTE,’ that could let remote attackers break the encryption used by VoLTE voice calls and spy on targeted phone calls. The attack doesn’t exploit any flaw in…
China-based lending company Moneed’s unprotected database has exposed the names and phone numbers of millions of Indians, putting them at risk of identity theft. Security researcher Anurag Sen found this database on an open elastic server that had more than 389 million phonebook records. Moneed has offices in Hangzhou, New Delhi, and Hong Kong. Sen told…
Attention! If you use Amazon’s voice assistant Alexa in you smart speakers, just opening an innocent-looking web-link could let attackers install hacking skills on it and spy on your activities remotely. Cybersecurity researchers today disclosed severe security vulnerabilities in Amazon’s Alexa virtual assistant that could render it vulnerable to a number of malicious attacks. According…
Twitter‘s had a rocky relationship with third-party developers creating apps on top of the service. Over the years, it has introduced limitations for apps such as the active number of tokens and the number of actions (you know, tweets, retweets, likes, and DMs) within a time frame, making it difficult to craft things like alternative Twitter clients. But…
Citrix said that it anticipates malicious actors “will move quickly to exploit” two critical flaws in its mobile device management software.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Now that Microsoft has closed Mixer for good, its streamers have to decide once and for all where they’re going. Two of Mixer‘s biggest stars — who both used to be two of Twitch’s biggest stars — have returned to their former platform to much rejoicing. While Twitch may not have been a perfect home,…