iOS 18.3.1 Release Expected Within the Next Few Weeks

iOS 18.3.1 Release Expected Within the Next Few Weeks

The first incremental update to Apple’s iOS 18.3 may drop next week, both 9to5Mac and MacRumors predict. Both sites monitor the devices used by their visitors to track waves of updates. It’s normal for Apple to release minor fixes after the launch of a new version, and iOS 18.3.1 is likely to include the same. However, the new release gained some unlikely buzz because of a TikTok rumor related to an optional satellite connectivity feature….

Read More

Product spotlight on mobile solutions

Product spotlight on mobile solutions

Mobile security solutions allow organizations to protect sensitive information and objects even when off-premises. Security magazine highlights both cyber and physical mobile security solutions. Cisco Duo Protect Identity Through Multi-Factor Authentication Duo’s Continuous Identity Security safeguards against intricate identity threats 24/7 while maintaining a smooth authentication experience for your entire workforce. Users can stay protected with flexible multi-factor authentication (MFA) including options using FIDO2 for phishing-resistant authentication. Image courtesy of Cisco Duo Find out more…

Read More

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

Zscaler Report: Mobile, IoT, and OT Cyber Threats Surge in 2024

A new report from cloud security company Zscaler sheds light on the growing mobile threats on Android operating systems, as well as IoT and OT devices threats. The findings come as more than 60% of the global Internet traffic is now generated by mobile devices and financially-oriented mobile threats have grown by 111% over the last year. A list of mobile malware threats Zscaler’s ThreatLabz witnessed a 29% rise in banking mobile malware over the…

Read More

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

How to Avoid the Top 5 Scariest Mobile Threats – McAfee Blogs

Scary movies are great. Scary mobile threats, not so much.  Ghosts, killer clowns, and the creatures can stir up all sorts of heebie-jeebies. The fun kind. Yet mobile threats like spyware, living dead apps, and botnets can conjure up all kinds of trouble.  Let’s get a rundown on the top mobile threats — then look at how you can banish them from your phone.  “I Know What You Did Because of Spyware”  Spyware is a…

Read More

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

It’s Beginning to Look a Lot Like Holiday Shopping: Secure Your Online Purchases

As we gear up to feast with family and friends this Thanksgiving, we prepare our wallets for Black Friday and Cyber Monday. Black Friday and Cyber Monday have practically become holidays themselves, as each year, they immediately shift our attention from turkey and pumpkin pie to holiday shopping. Let’s look at these two holidays and how their popularity can impact users’ online security, and grab a great Black Friday holiday deal from McAfee. About the…

Read More

Earth Preta’s Cyberespionage Campaign Hits Over 200

Earth Preta’s Cyberespionage Campaign Hits Over 200

This mix of traditional intelligence trade craft and cyber techniques could mean that these groups have access to advanced resources and support from nation states, since such techniques are not typically available to independent hackers. Moreover, this approach could signify the growing convergence of cyber- and physical security as cyberattacks continue to move beyond digital systems and into the physical world. Operation groups While this is not a comprehensive list, we summarize and attribute the…

Read More

TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users

TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users

Conclusion Despite having different deployment periods, we found the social media phishing campaigns and network infrastructure targeting Taiwan, Indonesia, and Thailand similar. When the victim downloads the fake app from the website given by the threat actor, or if victim tries to send a direct message to the threat actor through messaging apps such as WhatsApp or Viber, the cybercriminal deceives the user into registering, installing the malware, and enabling the permissions it needs. Once…

Read More

New APT34 Malware Targets The Middle East

New APT34 Malware Targets The Middle East

APT34 Targeting and Arsenal Evolution APT34 has been documented to target organizations worldwide, particularly companies from the financial, government, energy, chemical, and telecommunications industries in the Middle East since at least 2014. Documented as a group primarily involved for cyberespionage, APT34 has been previously recorded targeting government offices and show no signs of stopping with their intrusions. Our continuous monitoring of the group proves it continues to create new and updated tools to minimize the detection…

Read More

Attacking The Supply Chain: Developer

Attacking The Supply Chain: Developer

In 2021, we published an entry identifying the weak parts of the supply chain security. In the face of the surge in documented attacks, the entry gave a summarized overview of how malicious actors found gaps to abuse and take advantage of for possible gains and disruptions. In this entry, we focus on one specific part of the supply chain: the developers themselves. To find a suitable attack model focusing on the developer, we must…

Read More

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware

IcedID Botnet Distributors Abuse Google PPC to Distribute Malware Malware We analyze the latest changes in IcedID botnet from a campaign that abuses Google pay per click (PPC) ads to distribute IcedID via malvertising attacks. By: Ian Kenefick December 23, 2022 Read time:  ( words) After closely tracking the activities of the IcedID botnet, we have discovered some significant changes in its distribution methods. Since December 2022, we observed the abuse of Google pay per…

Read More
1 2 3 4