Pet Dog Unmasks Drug Trafficker on Encrypted Chat
Police studied photos sent via EncroChat to reveal users
Cyber News, Cyber Threat TrendsPolice studied photos sent via EncroChat to reveal users
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat TrendsApple has rolled out a number of security features that will now offer end-to-end encryption to protect data, including backups, contacts, notes, photos, and wallet passes. The company also announced hardware Security Keys for Apple ID.
Cyber News, Cyber Threat TrendsAn Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set of data wiper attacks aimed at diamond industries in South Africa, Israel, and Hong Kong. The wiper, codenamed Fantasy by ESET, is believed to have been delivered via a supply chain attack targeting an Israeli software suite developer as part […]
Cyber News, Cyber Threat TrendsAn Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target South Korean users by capitalizing on the recent Itaewon Halloween crowd crush to trick users into downloading malware. The discovery, reported by Google Threat Analysis Group researchers Benoît Sevens and Clément Lecigne, is the latest set of attacks perpetrated by ScarCruft, which […]
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat TrendsAttacks included fraud, vulnerability exploitation, fake applications and info stealer deployments
Cyber News, Cyber Threat Trends