Android ‘ActionSpy’ Malware Targets Turkic Minority Group
Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.
Researchers warn that the Earth Empusa threat group is distributing the spyware by injecting code into fake and watering-hole pages.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The ransomware attack hit the Tennessee city of Knoxville this week, causing disruptions in various services.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Microsoft has joined Amazon and IBM in banning the sale of facial recognition technology to police departments and pushing for federal laws to regulate the technology.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The Gamaredon APT has started using a new VBA macro to target Microsoft Outlook victims’ contact lists.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Malspam emails are claiming to deliver a survey on BLM — but in reality they deliver the infamous banking trojan.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cybersecurity researchers at Reason Labs, the threat research arm of security solutions provider Reason Cybersecurity, today disclosed details of a vulnerability they recently discovered in the Facebook Messenger application for Windows. The vulnerability, which resides in Messenger version 460.16, could allow attackers to leverage the app to potentially execute malicious files already present on a…
Misconfigured dashboards are at the heart of a widespread XMRIG Monero-mining campaign.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The ICS/SCADA-focused malware is likely behind a duo of attacks this week, on Honda and a South American energy company, researchers said.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Because remote workers’ devices are all connected to a home network, they don’t even need to be attacked directly. Instead, attackers have multiple avenues of attack that can be exploited.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
As cyber threats keep on increasing in volume and sophistication, more and more organizations acknowledge that outsourcing their security operations to a 3rd-party service provider is a practice that makes the most sense. To address this demand, managed security services providers (MSSPs) and managed service providers (MSPs) continuously search for the right products that would…