The government’s official IT security organisation CERT-In (Indian Computer Emergency Response Team) has asked Apple users to urgently update their iPhone and iPad units to the latest versions. iOS 14.7.1 and iPadOS 14.7.1 were released earlier this week with critical bug fixes. The updates fix a memory corruption zero-day vulnerability that the government confirms is
0 Comments
An Android malware that was observed abusing accessibility services in the device to hijack user credentials from European banking applications has morphed into an entirely new botnet as part of a renewed campaign that began in May 2021. Italy’s CERT-AGID, in late January, disclosed details about Oscorp, a mobile malware developed to attack multiple financial
0 Comments
Data-driven creative for sensitive verticals With big privacy changes, creative has become even more important with verticals like health and wellness and finance. Learn how to make data the backbone of your campaigns. Register for free now All the sessions from Transform 2021 are available on-demand now. Watch now. Ninety-seven percent of cloud-native security practitioners
0 Comments
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publicly disclosed flaws to their advantage. “Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets,
0 Comments
A previously undocumented Android-based remote access trojan (RAT) has been found to use screen recording features to steal sensitive information on the device, including banking credentials, and open the door for on-device fraud. Dubbed “Vultur” due to its use of Virtual Network Computing (VNC)’s remote screen-sharing technology to gain full visibility on targeted users, the
0 Comments
Business email compromise (BEC) refers to all types of email attacks that do not have payloads. Although there are numerous types, there are essentially two main mechanisms through which attackers penetrate organizations utilizing BEC techniques, spoofing and account take-over attacks. In a recent study, 71% of organizations acknowledged they had seen a business email compromise
0 Comments