‘Konfety’ Ad Fraud Uses 250+ Google Play Decoy Apps to Hide Malicious Twins
Jul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a “massive ad fraud operation” that leverages hundreds of
Continue readingJul 16, 2024NewsroomMobile Security / Online Security Details have emerged about a “massive ad fraud operation” that leverages hundreds of
Continue readingMuddyWater, an Iranian threat group, has recently started using a new, tailor-made backdoor to attack IT systems in the Middle
Continue readingA hacktivist group claims to have stolen and leaked over a terabyte of data from Diseny’s internal slack channels. The
Continue readingSecurity researchers have observed increased geopolitical DDoS attacks against Romania. The data comes from recent research conducted by ASERT, which
Continue readingHertzbleed, however, shows that frequency scaling generates timing differences in computations and these can be observed even remotely without any
Continue readingCompromised call and text records AT&T disclosed the breach in an SEC filing and said no actual content of any
Continue readingAs a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it
Continue readingIdentity-based threats on SaaS applications are a growing concern among security professionals, although few have the capabilities to detect and
Continue readingAround half (49%) of SME IT teams believe they lack the resources and staffing to defend their organization against cyber-threats,
Continue readingSpeculations on the method Cybersecurity experts pointed out that in recent incidents, hackers have breached Slack accounts by exploiting stolen
Continue reading