New CDRThief Linux Malware Steals Call Details from VoIP Softswitch Systems
A new kind of Linux malware dubbed "CDRThief" has been discovered by Cybersecurity researchers that target voice over IP (VoIP) Softswitches in an attempt...
Facebook Messenger’s bug that allowed Android users to spy on each other now fixed
Facebook has fixed a critical flaw within the Facebook Messenger for Android messaging app. The bug could have allowed an attacker to log in...
Hackers target cryptocurrency users with new ElectroRAT malware
Intezer Labs said it discovered fake cryptocurrency apps laced with ElectroRAT, a replacement Go-based malware strain.
Security firm Intezer Labs said it discovered a covert...
A New Wormable Android Malware Spreading Through WhatsApp
Android clients should look out for new wormable malware that spreads through WhatsApp and baits the imminent casualties into downloading an application from a...
Indian government proposes bill to ban cryptocurrencies
The Indian government will acquaint another bill with boycott exchanging and interests in digital forms of money during the Budget meeting of Parliament. Simultaneously,...
7 Uses for Generative AI to Enhance Security Operations
Welcome to a world where Generative AI revolutionizes the field of cybersecurity.
Generative AI refers to the use of artificial intelligence (AI) techniques to generate...
U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign-Based Agents
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) on Thursday sanctioned the North Korea-linked adversarial collective known as Kimsuky as...
New BLUFFS Bluetooth Attack Expose Devices to Adversary-in-the-Middle Attacks
New research has unearthed multiple novel attacks that break Bluetooth Classic's forward secrecy and future secrecy guarantees, resulting in adversary-in-the-middle (AitM) scenarios between two...
Russia’s AI-Powered Disinformation Operation Targeting Ukraine, U.S., and Germany
The Russia-linked influence operation called Doppelganger has targeted Ukrainian, U.S., and German audiences through a combination of inauthentic news sites and social media accounts.These...
Hacking the Human Mind: Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of cybersecurity, humans consistently remain...