Hackers Storing Malware in Google Drive as Encrypted ZIP Files
Google released the threat horizon report for April 2023, which showed multiple methods used by threat actors for evading security systems.
Google’s Cybersecurity Action Team...
Pakistani Hackers Use Linux Malware Poseidon to Target Indian Government Agencies
Apr 19, 2023Ravie LakshmananLinux / Malware
The Pakistan-based advanced persistent threat (APT) actor known as Transparent Tribe used a two-factor authentication (2FA) tool used...
Hackers Using Old Nokia 3310 Phone to Start Car Without Key
Recent car thefts have involved technology concealed inside outdated Nokia phones and Bluetooth speakers. This brand-new type of car theft is becoming more prevalent...
U.S. and U.K. Warn of Russian Hackers Exploiting Cisco Router Flaws for Espionage
Apr 19, 2023Ravie LakshmananNetwork Security / Cyber Espionage
U.K. and U.S. cybersecurity and intelligence agencies have warned of Russian nation-state actors exploiting now-patched flaws...
Iranian Government-Backed Hackers Targeting U.S. Energy and Transit Systems
Apr 19, 2023Ravie LakshmananCyber Threat / SCADA
An Iranian government-backed actor known as Mint Sandstorm has been linked to attacks aimed at critical infrastructure...
DoNot APT Hackers Attack Via Android Malware via Chatting Apps
CYFIRMA recently detected a cyber-attack on a person living in Kashmir, India, and obtained two malware pieces from the victim’s mobile download folder.
The investigation...
LockBit Ransomware Now Targeting Apple macOS Devices
Apr 18, 2023Ravie LakshmananEncryption / Malware
Threat actors behind the LockBit ransomware operation have developed new artifacts that can encrypt files on devices running...
DFIR via XDR: How to expedite your investigations with a DFIRent approach
Rapid technological evolution requires security that is resilient, up to date and adaptable.
In this article, we will cover the transformation in the field...











