Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns

Attackers exploiting an array of Google Services, including Forms, Firebase, Docs and more to boost phishing and BEC campaigns. Continue reading Google Services Weaponized to Bypass Security in Phishing, BEC Campaigns

University Email Hijacking Attacks Push Phishing, Malware

Attackers are compromising email accounts from popular universities, including Purdue and Oxford, to launch attacks that get around DMARC and SPF. Continue reading University Email Hijacking Attacks Push Phishing, Malware

Alien Android Banking Trojan Sidesteps 2FA

A new ‘fork’ of the Cerberus banking trojan, called Alien, targets victims’ credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook. Continue reading Alien Android Banking Trojan Sidesteps 2FA

Billions of Devices Impacted by Secure Boot Bypass

The “BootHole” bug could allow cyberattackers to load malware, steal information and move laterally into corporate, OT ,IoT and home networks. Continue reading Billions of Devices Impacted by Secure Boot Bypass

‘Fake Fingerprints’ Bypass Scanners with 3D Printing

New research used 3D printing technology to bypass fingerprint scanners, and tested it against Apple, Samsung and Microsoft mobile products. Continue reading ‘Fake Fingerprints’ Bypass Scanners with 3D Printing

FBI Taps Apple to Unlock Pensacola Shooter’s iPhone

It’s unclear yet whether the Cupertino giant will assist, given past history of court battles over such incidents. Continue reading FBI Taps Apple to Unlock Pensacola Shooter’s iPhone