Category cyber-attacks

Android Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures

A newly uncovered vulnerability dubbed “Janus” poses a significant threat to millions of Android devices, allowing attackers to overwrite legitimate applications with harmful malware without altering their signature verification. This critical flaw enables malicious updates to be distributed that maintain the appearance and functionality of the original applications. The vulnerability,…

Read MoreAndroid Vulnerability Allows Hackers to Inject Malware into Apps Without Modifying Signatures

The Surge of Human Trafficking Funded by Cryptocurrency

Cryptocurrency’s Role in Human Trafficking Exposed by Chainalysis Research Cryptocurrency’s promise of seamless, cross-border transactions has increasingly attracted nefarious activities, including the alarming rise of human trafficking operations. Recent findings from Chainalysis, a leading crypto-tracing firm, reveal that transactions linked to human trafficking—particularly those involving forced labor and sexual exploitation—grew…

Read MoreThe Surge of Human Trafficking Funded by Cryptocurrency

Newly Discovered ‘MoneyTaker’ Hacker Group Pilfers Millions from U.S. and Russian Banks

Security experts have identified a covert group of Russian-speaking hackers known as MoneyTaker, which has been actively targeting banks, financial institutions, and legal firms predominantly in the United States, the United Kingdom, and Russia. The Moscow-based cybersecurity firm Group-IB released a detailed report on Monday, unveiling the group’s operations that…

Read MoreNewly Discovered ‘MoneyTaker’ Hacker Group Pilfers Millions from U.S. and Russian Banks

TRITON Malware Threatens Critical Infrastructure with Potential for Physical Harm

Recent research has revealed a sophisticated malware strain named Triton, also referred to as Trisis, specifically engineered to compromise industrial control systems (ICS), posing significant threats to human safety and operational integrity. This malware exclusively targets Triconex Safety Instrumented System (SIS) controllers, produced by Schneider Electric, which serve as autonomous…

Read MoreTRITON Malware Threatens Critical Infrastructure with Potential for Physical Harm

The Resurgent Lumma Stealer Returns with Irresistible Lures

Lumma Malware Resurfaces, Targeting Windows Users Amid Renewed Attacks In a significant cybersecurity development, law enforcement agencies worldwide successfully disrupted Lumma, an infostealer responsible for infecting approximately 395,000 Windows computers within two months prior to a coordinated operation last May. However, researchers have announced that Lumma, also known as Lumma…

Read MoreThe Resurgent Lumma Stealer Returns with Irresistible Lures

North Korean Cyber Criminals Set Sights on Cryptocurrencies and POS Systems

In a new wave of cybercrime, the Lazarus Group, a North Korean state-sponsored hacking organization, has ramped up its activities, focusing on the cryptocurrency sector. Recent reports by security firm Proofpoint indicate a large-scale malware campaign targeting digital currency users, further illustrating the group’s extensive involvement in financially motivated cyberattacks.…

Read MoreNorth Korean Cyber Criminals Set Sights on Cryptocurrencies and POS Systems

CBP Enters Agreement with Clearview AI for Face Recognition in ‘Tactical Targeting’

U.S. Customs and Border Protection Expands Use of Facial Recognition Technology Amid Security Concerns U.S. Customs and Border Protection (CBP) has finalized a contract worth $225,000 for a year-long subscription to Clearview AI, a controversial facial recognition service that matches images against vast databases derived from publicly available online content.…

Read MoreCBP Enters Agreement with Clearview AI for Face Recognition in ‘Tactical Targeting’

Hackers Targeting Database Servers to Mine Cryptocurrency

Chinese Cybercrime Group Targets Database Servers Globally Recent investigations by security firm GuardiCore Labs have uncovered a series of extensive cyber-attack campaigns spearheaded by a prominent Chinese criminal organization. These attacks, which utilize multiple innovative techniques, are primarily aimed at database servers for the illicit purposes of mining cryptocurrencies, extracting…

Read MoreHackers Targeting Database Servers to Mine Cryptocurrency