Tag: EN

SonicWall Discloses Compromise of Cloud Backup Service

SonicWall said that threat actors accessed firewall preference files stored in the cloud for around 5% of its firewall install base This article has been indexed from www.infosecurity-magazine.com Read the original article: SonicWall Discloses Compromise of Cloud Backup Service

1 in 3 Android Apps Leak Sensitive Data

One third of Android and over half iOS apps shown to be leaking insecure APIs and hardcoded secrets This article has been indexed from www.infosecurity-magazine.com Read the original article: 1 in 3 Android Apps Leak Sensitive Data

AI Forged Military IDs Used In Phishing

A North Korean hacking group called Kimsuky has been identified for its use of AI to create counterfeit South Korean military ID cards. The post AI Forged Military IDs Used In Phishing first appeared on CyberMaterial. This article has been…

Glilot Capital Raises 500 Million Fund

Glilot Capital, an Israeli venture capital fund, recently announced that it has successfully raised $500 million. This significant new funding, sourced The post Glilot Capital Raises 500 Million Fund first appeared on CyberMaterial. This article has been indexed from CyberMaterial…

Google Removes 224 Android Malware Apps

A widespread ad fraud operation, nicknamed “SlopAds,” has been stopped. The campaign was discovered by HUMAN’s Satori Threat Intelligence team The post Google Removes 224 Android Malware Apps first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…

FileFix Uses Steganography To Drop StealC

A recently identified social engineering campaign, dubbed FileFix, has been exploiting unsuspecting users by impersonating official Meta account suspension warnings. The post FileFix Uses Steganography To Drop StealC first appeared on CyberMaterial. This article has been indexed from CyberMaterial Read…

Apple Backports Fix For Exploited Bug

In August 2025, Apple addressed a zero-day vulnerability, CVE-2025-43300, that was being actively exploited in its iOS, iPadOS, and macOS operating systems. The post Apple Backports Fix For Exploited Bug first appeared on CyberMaterial. This article has been indexed from…

Tracking New Entrants in Global Spyware Markets

Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous instrument—spyware. Spyware’s danger stems from its acute contribution to human rights abuses and national security risks. Most recently, NSO Group, a notorious spyware…

How CISOs Can Drive Effective AI Governance

AI’s growing role in enterprise environments has heightened the urgency for Chief Information Security Officers (CISOs) to drive effective AI governance. When it comes to any emerging technology, governance is hard – but effective governance is even harder. The first…

APT28 Operation Phantom Net Voxel

This post was originally distributed as a private FLINT report to our customers on 12 August 2025. Introduction Sekoia.io’s Threat Detection and Response (TDR) team closely monitors APT28 as one of its highest-priority threat actors. In early 2025 a trusted…