BlankBot Trojan Targets Turkish Android Users
While still under development, the malware contains Turkish-language filenames, can record the screen and keystrokes, and inject custom overlays to…
Apple’s New macOS Sequoia Tightens Gatekeeper Controls to Block Unauthorized Software
Apple on Tuesday announced an update to its next-generation macOS version that makes it a little more difficult for users…
Cyberattack Strikes the Grand Palais RMN; Impact Appears Limited
Everyone expected some kind of cyberattack during the Olympics. If this is the best they’ve got, the bad guys don’t…
Attackers Use Multiple Techniques to Bypass Reputation-Based Security
Protections like Windows Smart App Control are useful but susceptible to attacks that allow threat actors initial access to an…
Russia’s Priorities in Prisoner Swap Suggest Cyber Focus
At least two Russian nationals serving prison sentences for cybercrime offenses, Vladislav Klyushin and Roman Seleznev, were released as part…
Hunters International Disguises SharpRhino RAT as Legitimate Network Admin Tool
The RaaS group that distributes Hive ransomware delivers new malware impersonating as validly signed network-administration software to gain initial access…
INTERPOL Recovers $41 Million in Largest Ever BEC Scam in Singapore
INTERPOL said it devised a “global stop-payment mechanism” that helped facilitate the largest-ever recovery of funds defrauded in a business…
Preparing for the Future of Post-Quantum Cryptography
The AI boom and increasing popularity of quantum computing necessitates quantum-resilient security. The AI boom and increasing popularity of quantum…