Indian government rescues 250 citizens forced into cybercrime in Cambodia

01 April 2024PressroomCryptocurrency/financial fraud The Indian government said it had rescued and repatriated around 250 Cambodian citizens who had been held captive and forced to engage in cyber scams. Indian…

India repatriates citizens involved in cyber fraud activities in Cambodia

The Indian Embassy in Cambodia is working with local officials to rescue and repatriate Indian citizens who were duped by job offers in Cambodia into working in fraudulent online operations.…

Malicious apps secretly discovered turning Android phones into proxies for cybercriminals

01 April 2024PressroomBotnet/Mobile Security Several malicious Android apps have been observed on the Google Play Store that turn mobile devices running the operating system into residential proxies (RESIPs) for other…

Android banking trojan Vultur returns with updated remote control features

The Android banking Trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, allowing its operators to remotely interact with a…

RDP remains a security issue – Security Week with Tony Anscombe

video Much has been written about the risks of poorly secured RDP connections, but many organizations continue to put themselves at risk and suffer data breaches as a result March…

Hackers are targeting macOS users with malicious ads that spread stealer malware

March 30, 2024PressroomMalware/Cryptocurrency Malicious ads and fake websites act as a channel to spread two different stealer malware, including Atomic Stealer, targeting Apple macOS users. Ongoing infostealer attacks against macOS…

A secret backdoor found in the XZ Utils library, impacts major Linux distributions

March 30, 2024PressroomLinux/Supply Chain Attack RedHat on Friday released an “urgent security advisory” warning that two versions of a popular data compression library called XZ Utils (formerly LZMA Utils) have…

The cloud email filter bypass attack works 80% of the time

Computer scientists have discovered a surprisingly common misconfiguration in popular cloud-based enterprise email spam filtering services, along with an exploit to take advantage of it. The findings reveal that organizations…

Lessons from LockBit removal

Like most operators out there, we Truly I appreciated the news last month about international law enforcement agencies shutting down LockBit, one of the largest in the world the most…

Are you affected by the backdoor in XZ Utils?

Red Hat warns that a vulnerability in XZ Utils, the XZ format compression utility included with many Linux distributions, is a backdoor. Users should downgrade the utility to a more…