Android.Cynos.7.origin trojan infected +9 million Android devices
Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters)…
The 5 Most Common Cyber-Attacks on Mobile Devices In 2021
By Nicole Allen, Marketing Executive, Salt Communications. Many companies are prioritising mobile efforts these days with research suggesting that increased mobility helps businesses enhance their operations and efficiency. Verizon’s 2021…
Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business
The Flip Side of Using Cloud Telephony Services By Sujan Thapaliya, CEO and Co-Founder, KrispCall It is evident that VoIP will be the future of business communications. Historically, it has…
Utah Imaging Associates data breach impacts 583,643 patients
Utah-based radiology medical center Utah Imaging Associates discloses a data breach that impacted 583,643 former and current patients. Utah Imaging Associates (UIA) discloses a security breach, on September 4, 2021…
Securing Today’s Hybrid Remote Workforce
By CISO T.J. Minichillo Work may never be the same again as the world continues to grapple with the global pandemic — pivoting from office-based business environments to fully remote…
Attackers deploy Linux backdoor on e-stores compromised with software skimmer
Researchers discovered threat actors installing a Linux backdoor on compromised e-commerce servers after deploying a credit card skimmer into e-stores. Security researchers from Sansec Threat Research Team discovered a Linux…
Iran-linked APT groups continue to evolve
The researchers at Microsoft Threat Intelligence Center (MSTIC) are warning of increasingly sophisticated operations carried out by Iranian threat actors. The Microsoft Threat Intelligence Center (MSTIC) shared the results of…
New evolving Abcbot DDoS botnet targets Linux systems
Qihoo 360’s Netlab detailed a new evolving DDoS botnet called Abcbot with wormable capabilities that targets Linux systems. Researchers from Qihoo 360’s Netlab security team have spotted a new botnet,…
What To Know to Fight Against Cyber Attacks
By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our reality, not only that we are all constantly getting phishing emails, but…
Hundreds of thousands of fake warnings of cyberattacks sent from a hacked FBI email server
Threat actors hacked email servers of the FBI to distribute spam email impersonating FBI warnings of fake cyberattacks. The email servers of the FBI were hacked to distribute spam email…
Why The Integration of Netops And Secops Is Here To Stay
By Eileen Haggerty, Sr. Director, Enterprise Business Operations, NETSCOUT The pandemic accelerated digital transformation and increased organizations’ reliance on cloud services, VPNs, and other solutions designed to support remote work….
Digital Transformation Security: Guidelines for Success
By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in the digital domain enterprises, local and federal agencies, and SMBs alike are…