Tag Trend Micro

1 Million Third-Party Android Devices Expose Hidden Backdoor for Scammers

Research teams from various cybersecurity firms have uncovered that a recent campaign appears to originate from a loosely organized network of fraud groups instead of a single perpetrator. Each participating group operates its own variations of the Badbox 2.0 backdoor and associated malware modules, distributing these threats through diverse methods.…

Read More1 Million Third-Party Android Devices Expose Hidden Backdoor for Scammers

Fraudulent IT Support Calls Deceive Microsoft Teams Users into Downloading Ransomware

Cybercriminals Exploit Remote Access Technologies in New Tech Support Scam Cybersecurity experts at Trend Micro have raised alarms about a sophisticated scam in which cybercriminals impersonate tech support agents to gain illicit access to victims’ computers. This threat extends beyond traditional spam emails; attackers are utilizing a barrage of emails…

Read MoreFraudulent IT Support Calls Deceive Microsoft Teams Users into Downloading Ransomware

What Is DeepSeek AI? Exploring the DeepSeek Leak and OpenAI Breach Allegations

In an era where artificial intelligence is making tremendous strides, concerns over cybersecurity are mounting, as recent incidents involving major players like OpenAI and DeepSeek AI underscore the vulnerabilities that accompany such advancements. Both organizations have faced serious breaches, eliciting alarm over the safety of user data and the potential…

Read MoreWhat Is DeepSeek AI? Exploring the DeepSeek Leak and OpenAI Breach Allegations

Financially Driven Hackers Collaborate with Espionage Operatives: A Mutual Assistance Network

On Thursday, researchers from Symantec announced a noteworthy development regarding the RA World ransomware group, which allegedly utilized a sophisticated toolset previously associated only with espionage operations linked to a Chinese threat group. This collaboration signifies a troubling convergence of ransomware and state-sponsored hacking capabilities. The toolset in question, identified…

Read MoreFinancially Driven Hackers Collaborate with Espionage Operatives: A Mutual Assistance Network

Exploitation of 7-Zip 0-Day Vulnerability During Russia’s Ongoing Invasion of Ukraine

Zero-Day Vulnerability Discovered in 7-Zip Amid Ongoing Conflict in Ukraine In recent developments, security researchers have identified a zero-day vulnerability in the widely used 7-Zip archiving application, which has reportedly been exploited in connection with Russia’s military operations in Ukraine. The vulnerability poses a significant security risk, as it allows…

Read MoreExploitation of 7-Zip 0-Day Vulnerability During Russia’s Ongoing Invasion of Ukraine

Russian SmokeLoader Campaign in Ukraine Exploits 7-Zip Zero-Day Vulnerability

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Espionage and Cybercrime Campaign Linked to 7-Zip Mark-of-the-Web Exploit Targeting Ukraine Mathew J. Schwartz (euroinfosec) • February 4, 2025 Image: Shutterstock A severe security vulnerability in the widely utilized Windows archiving tool, 7-Zip, has reportedly been leveraged by Russian cyber adversaries to…

Read MoreRussian SmokeLoader Campaign in Ukraine Exploits 7-Zip Zero-Day Vulnerability

The Internet Flooded Again with IoT Botnets Launching Unprecedented DDoS Attacks

In early January 2025, the cybersecurity landscape is already experiencing significant disruptions, particularly driven by the proliferation of Internet of Things (IoT) devices. Researchers report an uptick in Distributed Denial of Service (DDoS) attacks that target various IoT-connected devices, including home routers and surveillance cameras. As these devices become increasingly…

Read MoreThe Internet Flooded Again with IoT Botnets Launching Unprecedented DDoS Attacks