Apple Says WebKit Zero-Day Hitting iOS, macOS Devices
Apple’s struggles with zero-day attacks on its iOS and macOS platforms are showing no signs of slowing down.
read more
Continue reading Apple Says WebKit Zero-Day Hitting iOS, macOS Devices
Collaborate Disseminate
Apple’s struggles with zero-day attacks on its iOS and macOS platforms are showing no signs of slowing down.
read more
Continue reading Apple Says WebKit Zero-Day Hitting iOS, macOS Devices
Google on Monday announced that the Android security updates for February 2022 patch a total of 36 vulnerabilities.
The first part of the update arrives on devices as the 2022-02-01 patch level and delivers fixes for 15 security holes in three componen… Continue reading Android’s February 2022 Security Updates Patch 36 Vulnerabilities
Two powerful trojans with spyware and RAT capabilities are being delivered in side-by-side campaigns using a common infrastructure. Continue reading Medusa Malware Joins Flubot’s Android Distribution Network
The now-patched flaw that led to the ForcedEntry exploit of iPhones was exploited by both NSO Group and a different, newly detailed surveillance vendor.
Continue reading QuaDream, 2nd Israeli Spyware Firm, Weaponizes iPhone Bug
The ‘smishing’ group lives up to its name, expanding globally and adding image exfiltration to the Wroba RAT it uses to infect mobile victims. Continue reading Roaming Mantis Expands Android Backdoor to Europe
How much do you know about the metaverse? Everyone started talking about the metaverse in the summer of 2021. Facebook CEO Mark Zuckerberg kicked it off with his plan to focus his company on building what he imagined would be the future of social, business, leisure and culture: the metaverse. He even changed the name […]
The post Will the Metaverse Usher in a Universe of Security Challenges? appeared first on Security Intelligence.
Continue reading Will the Metaverse Usher in a Universe of Security Challenges?
The usual tax-season barrage of cybercriminal activity is already underway with a phishing campaign impersonating the popular accounting and tax-filing software. Continue reading Attackers Target Intuit Users by Threatening to Cancel Tax Accounts
A growing class of phishing kits – transparent reverse proxy kits – are being used to get past multi-factor authentication using MiTM tactics. Continue reading Low-Detection Phishing Kits Increasingly Bypass MFA
Despite what security vendors might say, there is no way to comprehensively solve our supply-chain security challenges, posits JupiterOne CISO Sounil Yu. We can only manage them. Continue reading Supply-Chain Security Is Not a Problem…It’s a Predicament