Malware may abuse Android’s accessibility service to bypass security enhancements

Mobile financial malware authors may borrow tricks from adware by using Android’s accessibility service to circumvent OS improvements.

Read More Continue reading Malware may abuse Android’s accessibility service to bypass security enhancements

New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits

Exploit kits (EKs) including Magnitude and Nuclear have begun to exploit a type confusion vulnerability in Adobe Flash Player (CVE-2016-1019).Read More Continue reading New Adobe Flash Player exploit used by Magnitude and Nuclear exploit kits

Taiwan targeted with new cyberespionage back door Trojan

Backdoor.Dripion was custom developed, deployed in a highly targeted fashion, and used command and control servers disguised as antivirus company websites.Read More Continue reading Taiwan targeted with new cyberespionage back door Trojan

Seven Iranians charged in relation to cyberattacks against US

The attackers mainly used Brobot malware to build a botnet of compromised servers to perform DDoS attacks against US banks and other organizations.Read More Continue reading Seven Iranians charged in relation to cyberattacks against US

Suckfly: Revealing the secret life of your code signing certificates

A China-based APT group has an insatiable appetite for stolen code-signing certificates.Read More Continue reading Suckfly: Revealing the secret life of your code signing certificates