Malware

Xenomorph Android Banking Trojan Makes Landfall in US
A sophisticated Android banking trojan that was first seen last year targeting banking apps in several European countries has made its way across the Atlantic Ocean, looking to steal credentials and money ...

‘All of Sony’ Hacked, Claims Ransomed.vc Group
Hackers Play in Sony’s World: If true, Sony might have to push the RESET button (again) ...

Building Your Incident Response Team
When the inevitable breach happens, an incident response team is a key asset. Here’s how to build one ...

Data Breaches from MOVEit Zero-Day Still Piling Up
Cybercrime groups exploiting the zero-day flaw in the MOVEit managed file transfer software linked to the Cl0p ransomware gang continue to rack up victims, with the National Student Clearinghouse non-profit group and ...

More iOS Zero Days, More Mercenary Spyware — This Time: Cytrox Predator
Apple Scrambled to Fix 3 More CVEs: Egyptian opposition presidential candidate Ahmed Eltantawy targeted “by the government ...

Qakbot Takedown Resembles Hack Back, Will Botnet, Malware Be Resurrected?
Operation 'Duck Hunt' tricked thousands of Qakbot-infected computers into downloading an FBI-made uninstaller. Can it resurrect? Only time will tell ...

China Accuses US of Years of Cyber-Spying, Malware Campaigns
The Chinese government is accusing the United States intelligence community of launching cyber-espionage campaigns against the country for years after hacking into Huawei servers as far back as 2009. China’s Ministry of ...

The Battle of the Bots: Safeguarding Identity in the Age of AI
In the age of generative AI, identity is being exploited by attackers as a weakness in the security perimeter. Here's what to do ...

Gaming, Financial Services Apps Under Attack
Malicious actors are targeting gaming and FinServ apps developed for both Apple iOS and the Android platform, according to Digital.ai's latest Threat Analytics Report ...

Barracuda Networks Issues Email Inbox Rules Manipulation Warning
A Barracuda report found cybercriminals are becoming more adept at manipulating email inbox rules to hide their tracks after taking over an account ...