A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.
The post Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices appeared first on SecurityWeek.
A new Android trojan named Brokewell can steal user’s sensitive information and allows attackers to take over devices.
The post Powerful ‘Brokewell’ Android Trojan Allows Attackers to Takeover Devices appeared first on SecurityWeek.
A North Korea-linked threat actor hijacked the update mechanism of eScan antivirus to deploy backdoors and cryptocurrency miners.
The post North Korean Hackers Hijack Antivirus Updates for Malware Delivery appeared first on SecurityWeek.
A threat actor tracked as CoralRaider has been using multiple infostealers to harvest credentials from users worldwide.
The post Threat Actor Uses Multiple Infostealers in Global Campaign appeared first on SecurityWeek.
Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations.
The post Russian Cyberspies Deliver ‘GooseEgg’ Malware to Government Organizations appeared first on SecurityWeek.
Checkmarx warns of a new attack relying on GitHub search manipulation to deliver malicious code.
The post Threat Actors Manipulate GitHub Search to Deliver Malware appeared first on SecurityWeek.
Human Security identifies 28 VPN applications for Android and an SDK that turn devices into proxies.
The post VPN Apps on Google Play Turn Android Devices Into Proxies appeared first on SecurityWeek.
A suspicious NuGet package likely targets developers working with technology from Chinese firm Bozhon.
The post Suspicious NuGet Package Harvesting Information From Industrial Systems appeared first on SecurityWeek.
More than 100 organizations in the US and EU have been targeted in recent StrelaStealer infostealer campaigns.
The post Over 100 Organizations Targeted in Recent ‘StrelaStealer’ Attacks appeared first on SecurityWeek.
Chinese APT Evasive Panda compromises a software developer’s supply chain to target Tibetans with malicious downloaders.
The post Chinese Cyberspies Target Tibetans via Watering Hole, Supply Chain Attacks appeared first on SecurityWeek.
Russian state-sponsored threat actor Turla has been using a new backdoor in recent attacks targeting Polish NGOs.
The post Russian Turla Cyberspies Target Polish NGOs With New Backdoor appeared first on SecurityWeek.