Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster tracked as UNG0002 (aka Unknown Group 0002) as part of a broader cyber espionage campaign. “This threat entity demonstrates a strong preference for…
Category: EN
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that’s used by law enforcement authorities in China to gather information from seized mobile devices. The hacking tool, believed to be a successor of MFSocket, is developed by…
New Surge of Crypto-Jacking Hits Over 3,500 Websites
Cybersecurity experts at cside have discovered a clever campaign that infected over 3,500 websites with nefarious JavaScript miners, marking a startling return to crypto-jacking techniques reminiscent of the Coinhive heyday of 2017. This new wave, detected in late 2024, marks…
AI-Driven Threat Hunting: Catching Zero Day Exploits Before They Strike
Picture this: you’re a cybersecurity pro up against an invisible enemy. Hidden in your network are zero-day exploits, which represent unknown vulnerabilities that await their moment to strike. The time you spend examining logs becomes pointless because the attack might…
What is biometric authentication?
<p>Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify their identity. Instead of relying on personal identification numbers (PINs) or <a href=”https://www.techtarget.com/searchsecurity/definition/password”>passwords</a>, biometric authentication systems compare physical or behavioral traits to stored,…
How to create a risk management plan: Template, key steps
<p>From supply chain disruptions and cybersecurity threats to regulatory changes, economic volatility and more, the risks that can derail projects, disrupt business operations or damage a company’s reputation are varied and growing ever more complex. A <a href=”https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-and-why-is-it-important”>risk management</a> plan…
A surveillance vendor was caught exploiting a new SS7 attack to track people’s phone locations
The new SS7 bypass-attack tricks phone operators into disclosing a cell subscriber’s location, in some cases down to a few hundred meters. This article has been indexed from Security News | TechCrunch Read the original article: A surveillance vendor was…
New Wave of Crypto-Hijacking Infects 3,500+ Websites
A stealth Monero-mining campaign has quietly compromised more than 3,500 websites by embedding an innocuous-looking JavaScript file called karma.js. The operation leverages WebAssembly, Web Workers, and WebSockets to siphon CPU cycles while keeping resource usage low enough to avoid user…
Google Sues the Operators Behind the BadBox 2.0 Botnet
Google is suing the operators behind BadBox 2.0, accusing multiple Chinese threat groups of playing different roles in the operation of the massive botnet that rolled up more than 10 million devices to run large-scale ad fraud and other malicious…
Fancy Bear Hackers Target Governments and Military Entities with Advanced Tools
Fancy Bear, designated as APT28 by cybersecurity experts, represents a sophisticated Russian cyberespionage collective operational since 2007, renowned for infiltrating governments, military organizations, and strategic entities globally. This group, also known under aliases such as Sofacy, Sednit, STRONTIUM, and Unit…
I changed 12 settings on my Apple TV to instantly improve the performance
Spending just a few minutes in your Apple TV’s settings can unlock a far better viewing experience. Here’s how. This article has been indexed from Latest news Read the original article: I changed 12 settings on my Apple TV to instantly…
Snake Keylogger Bypasses Windows Defender and Uses Scheduled Tasks to Steal Credentials
Threat actors have been using a sophisticated phishing operation to impersonate Turkish Aerospace Industries (TUSAŞ) in order to attack Turkish businesses, especially those in the defense and aerospace sectors. The campaign distributes malicious emails masquerading as contractual documents, such as…
Burn that List: Smarter Use of Allowlists and Denylists in Multi-Tenant Systems
In multi-tenant systems—whether you’re managing an API gateway, identity platform, or SaaS product—access control is essential. Two of the most widely used tools for managing that access are allowlists and denylists. These mechanisms define who or what is permitted or rejected,…
The OnePlus 12 was already our favorite Android deal – and now it’s $300 off
With its market-leading charging speeds, mega battery life, and premium build, the OnePlus 12 is a worthy rival to flagship handsets. This article has been indexed from Latest news Read the original article: The OnePlus 12 was already our favorite…
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2025-25257 Fortinet FortiWeb SQL Injection Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks…
US Congress Passes Stablecoin Bill
US Congress passes bill to regulate stablecoins, in major win for crypto industry as it seeks to move into mainstream commerce This article has been indexed from Silicon UK Read the original article: US Congress Passes Stablecoin Bill
PoisonSeed Tricking Users Into Bypassing FIDO Keys With QR Codes
PoisonSeed group tricks users into bypassing FIDO Keys by misusing QR code logins, highlighting new social engineering risk to secure MFA. This article has been indexed from Hackread – Latest Cybersecurity, Hacking News, Tech, AI & Crypto Read the original…
Meta execs pay the pain away with $8 billion privacy settlement
Meta executives settled a shareholders’ lawsuit alleging continuous disregard of privacy regulations for the price of $8 billion. This article has been indexed from Malwarebytes Read the original article: Meta execs pay the pain away with $8 billion privacy settlement
Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’
All Your UAVs Are Belong to UKR: Ukrainian Cyber Alliance and Black Owl team up to hack manufacturer of Russian military drones, sources say. The post Ukraine Pwns Russian Drone Maker — Gaskar is ‘Paralyzed’ appeared first on Security Boulevard.…
Asia is a Major Hub For Cybercrime, And AI is Poised to Exacerbate The Problem
Southeast Asia has emerged as a global hotspot for cybercrimes, where human trafficking and high-tech fraud collide. Criminal syndicates operate large-scale “pig butchering” operations in nations like Cambodia and Myanmar, which are scam centres manned by trafficked individuals compelled…