A new banking Trojan is targeting Korean users using obfuscation techniques that target the Android manifest, exploit vulnerabilities and take advantage of weaknesses in how Android apps interpret this file. SoumniBot stands out for its approach to camouflaging its malicious intent.
This week, police disrupted the LabHost phishing-as-a-service site, customer data compromised in Omni Hotels hack, more Ivanti vulnerabilities found, Moldovan botnet operator faces U.S. charges, Cisco warned of a data breach in Duo and a Spanish Guardia Civil contractor suffered a ransomware attack.
Security researchers have observed Chinese-speaking threat actors using a highly modular espionage malware to target individuals in India and Southeast Asia and exfiltrate highly sensitive data from their devices. BlackBerry says the attacks coincided with Apple’s spyware warnings in India in October.
Cybersecurity experts and top lawmakers are warning that a successful cyberattack targeting federally-regulated dams across the United States - the majority of which have not received a cyber audit - could result in a severe impact on public health and even mass casualties.
A New York federal jury has found a hacker guilty of charges that he masterminded and carried out a scheme to fraudulently obtain $110 million in cryptocurrency from crypto currency exchange Mango Markets and investors.
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
In today’s digital era, identity security has emerged as a pivotal factor in an organization’s ability to meet compliance requirements, shaping enterprise security and trust. Identity security goes beyond mere adherence to regulations; rather, it provides a strategic, proactive approach to compliance by ensuring...
Cybercriminals today have more opportunities than ever to infiltrate your business. We’ve seen an explosion both in cyber threats—including software supply chain attacks, ransomware, advanced persistent threats—and ever-changing international, federal, state, local, and industry-specific regulations intended to...
Healthcare sector organizations often still struggle to implement security frameworks effectively, often not fully understanding the requirements or failing to integrate them into their overall cybersecurity strategy, said Keith Forrester of security firm Optiv, who offers tips to help.
Robotic medical devices, such as surgical gear, offer great potential to improve patient care, but the cyber risks associated with these products must be carefully addressed, said Kevin Fu, director of the Archimedes Center for Health Care and Medical Device Cybersecurity at Northeastern University.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.