July 22, 2019 Fake FaceApp Infects Users With MobiDash Malware 2 min read - Amid warnings about the security risks of the "FaceApp Challege," a new threat has emerged: MobiDash malware piggybacking on fake FaceApp installs.
July 22, 2019 Weekly Security News Roundup: Vulnerability Exposed Instagram Attacks to Hijacking 3 min read - Last week in security news, a researcher uncovered a critical vulnerability that allowed attackers to hijack any Instagram account within 10 minutes.
July 17, 2019 SWEED Threat Actor Uses Typosquatting, UAC Bypasses to Distribute Agent Tesla < 1 min read - Researchers observed a threat actor known as SWEED using typosquatting and UAC bypassing techniques to distribute Agent Tesla and other malware.
July 17, 2019 UK Government Urges Organizations to Defend Against DNS Hijacking 2 min read - The U.K. National Cyber Security Centre (NCSC) published an alert urging organizations to implement measures to mitigate against DNS hijacking.
July 16, 2019 Telegram, WhatsApp Vulnerability Exposes Media Files to Tampering 2 min read - Symantec discovered a Telegram and WhatsApp vulnerability that could enable digital attackers to tamper with media files.
July 15, 2019 Digital Attackers Now Using 16Shop Phishing Kit to Target Amazon Users < 1 min read - Digital attackers are now abusing the 16Shop phishing kit to target Amazon users for the purpose of stealing access to their accounts.
July 15, 2019 Threat Actors Could Abuse iOS URL Scheme to Undermine User Privacy 2 min read - Threat actors could abuse the iOS URL Scheme to undermine user privacy and stage other attacks with respect to certain vendors' apps.
July 15, 2019 Weekly Security News Roundup: Zero-Day Vulnerability Exploited in Buhtrap Attack Campaign 3 min read - Last week, security researchers identified a zero-day vulnerability that was instrumental in a targeted attack against companies in Eastern Europe.
July 10, 2019 Zoom Vulnerability Could Let Third Parties Take Over Webcams 2 min read - A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.
July 10, 2019 Astaroth Attack Infects Windows Machines Via Living-Off-the-Land Techniques 2 min read - An Astaroth attack leveraged only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.