Microsoft Uncovers Austrian Company Exploiting Windows and Adobe Zero-Day Exploits

A cyber mercenary that “ostensibly sells general security and information analysis services to commercial customers” used several Windows and Adobe zero-day exploits in limited and highly-targeted attacks against European and Central American entities… Continue reading Microsoft Uncovers Austrian Company Exploiting Windows and Adobe Zero-Day Exploits

Posted in Uncategorized

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware

As many as 30 malicious Android apps with cumulative downloads of nearly 10 million have been found on the Google Play Store distributing adware.
“All of them were built into various programs, including image-editing software, virtual keyboards, syste… Continue reading These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware

Posted in Uncategorized

New Ducktail Infostealer Malware Targeting Facebook Business and Ad Accounts

Facebook business and advertising accounts are at the receiving end of an ongoing campaign dubbed Ducktail designed to seize control as part of a financially driven cybercriminal operation. 
“The threat actor targets individuals and employees that may… Continue reading New Ducktail Infostealer Malware Targeting Facebook Business and Ad Accounts

Posted in Uncategorized

Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Threat actors are increasingly abusing Internet Information Services (IIS) extensions to backdoor servers as a means of establishing a “durable persistence mechanism.”
That’s according to a new warning from the Microsoft 365 Defender Research Team, wh… Continue reading Malicious IIS Extensions Gaining Popularity Among Cyber Criminals for Persistent Access

Posted in Uncategorized

Critical FileWave MDM Flaws Open Organization-Managed Devices to Remote Hackers

FileWave’s mobile device management (MDM) system has been found vulnerable to two critical security flaws that could be leveraged to carry out remote attacks and seize control of a fleet of devices connected to it.
“The vulnerabilities are remotely ex… Continue reading Critical FileWave MDM Flaws Open Organization-Managed Devices to Remote Hackers

Posted in Uncategorized