Hackers Storing Malware in Google Drive as Encrypted ZIP Files

0
Google released the threat horizon report for April 2023, which showed multiple methods used by threat actors for evading security systems. Google’s Cybersecurity Action Team...

Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies

0
Apr 19, 2023Ravie LakshmananLinux / Malware The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used...

Hackers Using Old Nokia 3310 Phone to Start Car Without Key

0
Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft is becoming more prevalent...

U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage

0
Apr 19, 2023Ravie LakshmananNetwork Security / Cyber Espionage U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws...

Iranian Government-Backed Hackers Targeting U.S. Energy and Transit Systems

0
Apr 19, 2023Ravie LakshmananCyber Threat / SCADA An Iranian government-backed actor known as Mint Sandstorm has been linked to attacks aimed at critical infrastructure...

DoNot APT Hackers Attack Via Android Malware via Chatting Apps

0
CYFIRMA recently detected a cyber-attack on a person living in Kashmir, India, and obtained two malware pieces from the victim’s mobile download folder. The investigation...

LockBit Ransomware Now Targeting Apple macOS Devices

0
Apr 18, 2023Ravie LakshmananEncryption / Malware Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running...

DFIR via XDR: How to expedite your investigations with a DFIRent approach

0
Rapid technological evolution requires security that is resilient, up to date and adaptable. In this article, we will cover the transformation in the field...