Stealthy MacOS Malware Tied to Lazarus APT

Researcher discovered a MacOS trojan hiding behind a fake crypto trading platform believed to be the work of the state-sponsored North Korean hackers behind WannaCry. Continue reading Stealthy MacOS Malware Tied to Lazarus APT

‘Ultimate’ MiTM Attack Steals $1M from Israeli Startup

Researchers uncovers “ultimate man-in-the-middle attack” that used an elaborate spoofing campaign to fool a Chinese VC firm and rip off an emerging business. Continue reading ‘Ultimate’ MiTM Attack Steals $1M from Israeli Startup

Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

Prosecution asks for imprisonment of the hacker who stole nude photos and other personal data from women’s iCloud accounts and then distributed some of the material online. Continue reading Dutch Politician Could Get Three Years in Prison for Hacking iCloud Accounts

‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps

The flaw can allow hackers to take over typical device functions like sending messages and taking photos because users think malicious activity is a mobile app they use regularly. Continue reading ‘StrandHogg’ Vulnerability Allows Malware to Pose as Legitimate Android Apps

Insecure Database Exposes Millions of Private SMS Messages

Researchers discovered an unprotected TrueDialog database hosted by Microsoft Azure with diverse and business-related data from tens of millions of users. Continue reading Insecure Database Exposes Millions of Private SMS Messages

Popular Apps on Google Play Store Remain Unpatched

Check Point researchers found that hundreds of marquee Android mobile apps still contain vulnerabilities that allow remote code-execution even if users update. Continue reading Popular Apps on Google Play Store Remain Unpatched