Overlay attacks involve placing a tricky layer over legitimate applications on mobile devices like Android. This malicious overlay can mimic the interface of trusted apps, tricking users into entering sensitive
Uncategorized
Azure API Management Flaws Let Attackers Take Full Control APIM Service
Security researchers at Binary Security have uncovered critical vulnerabilities in Microsoft’s Azure API Management (APIM) service that could allow attackers with basic Reader permissions to gain complete administrative control of
APT36 Group Attacking Windows Systems Absuing Google Drive & Slack
ElizaRAT is a type of malware that primarily targets Windows systems and functions as a RAT. It enables threat actors to gain unauthorized access to infected machines. This malware is
ToxicPanda Banking Malware Attacking Banking Users To Steal Logins
Banking malware and trojans are malicious software designed to steal sensitive financial information from users. Once installed, these Trojans can employ techniques such as keylogging and screen overlays to collect
ClickFix Leveraging GMeet & Zoom Pages To Deliver Infostealer Malware
A sophisticated social engineering tactic dubbed “ClickFix” has emerged as a significant cybersecurity threat, exploiting fake Google Meet and Zoom conference pages to distribute malicious software. First identified in May
Nokia Investigating Data Breach, IntelBroker Allegedly Selling Source Code
Nokia, the multinational telecommunications company, is currently investigating claims of a significant data breach after a notorious hacker known as IntelBroker announced the sale of allegedly stolen source code and
Antivirus, Anti-Malware Lead Demand for AI/ML Tools
SOC Pricing: Practical Guide to Securing Your Business Without Surprises
Figuring out SOC pricing doesn’t have to be overwhelming. I’ve been there—facing the question of “How much should we spend on security?” You’re not alone. It’s a tricky balance between
Hackers Using AV/EDR Tool “EDRSandBlast” To Bypass Endpoints
AV, anti-malware, and EDR are tools that are primarily used to detect and prevent cyber-attacks. While the AV/EDR bypass tools are designed to evade detection by AV and EDR systems.
Opera Browser 0-Day Flaw Allows Malicious Extensions to Takeover Browser
A critical vulnerability in the Opera web browser has been discovered that could allow malicious extensions to gain unauthorized access to private APIs, potentially leading to account hijacking and other