Proofpoint: Watch Out for Nighthawk Hacking Tool Abuse

Security researchers at Proofpoint are calling attention to the discovery of a commercial red-teaming tool called Nighthawk, warning that the command-and-control framework is likely to be abused by threat actors.
read more Continue reading Proofpoint: Watch Out for Nighthawk Hacking Tool Abuse

IT threat evolution in Q3 2022. Mobile statistics

In Q3 2022, a total of 5,623,670 mobile malware, adware, and riskware attacks were blocked, and 438,035 malicious installation packages were detected. Continue reading IT threat evolution in Q3 2022. Mobile statistics

Advanced threat predictions for 2023

We polled our experts from the GReAT team and have gathered a small number of key insights about what APT actors are likely to focus on in 2023. Continue reading Advanced threat predictions for 2023

Google Reveals Spyware Vendor’s Use of Samsung Phone Zero-Day Exploits

Google Project Zero has disclosed the details of three Samsung phone vulnerabilities that have been exploited by a spyware vendor since when they still had a zero-day status.
read more Continue reading Google Reveals Spyware Vendor’s Use of Samsung Phone Zero-Day Exploits

Malicious droppers on Google Play deliver banking malware to victims

Android users are often advised to get mobile apps from Google Play, the company’s official app marketplace, to minimize the possibility of downloading malware. After all, Google analyzes apps before allowing them on the market. Unfortunately, ti… Continue reading Malicious droppers on Google Play deliver banking malware to victims

How the Mac OS X Trojan Flashback Changed Cybersecurity

Not so long ago, the Mac was thought to be impervious to viruses. In fact, Apple once stated on its website that “it doesn’t get PC viruses”. But that was before the Mac OS X Trojan Flashback malware appeared in 2012. Since then, Mac and iPhone security issues have changed dramatically — and so has […]

The post How the Mac OS X Trojan Flashback Changed Cybersecurity appeared first on Security Intelligence.

Continue reading How the Mac OS X Trojan Flashback Changed Cybersecurity

Calls for UK to Probe Reported Hacking of Liz Truss’s Phone

UK opposition politicians called for an investigation Saturday after a newspaper reported that suspected Kremlin agents had hacked ex-Prime Minister Liz Truss’s cell phone when she was foreign minister.
read more Continue reading Calls for UK to Probe Reported Hacking of Liz Truss’s Phone