Category: Attack

CAPTCHA-Breaking Services with Human Solvers Helping Cybercriminals Defeat Security

[ad_1] May 30, 2023Ravie Lakshmanan Cybersecurity researchers are warning about CAPTCHA-breaking services that are being…

Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers

[ad_1] May 30, 2023Ravie LakshmananZero Day / Vulnerability Multiple security flaws uncovered in Sonos One…

Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users

[ad_1] A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily…

PyPI Implements Mandatory Two-Factor Authentication for Project Owners

[ad_1] May 29, 2023Ravie LakshmananSupply Chain / Programming The Python Package Index (PyPI) announced last…

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

[ad_1] If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our…

New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force

[ad_1] May 29, 2023Ravie LakshmananAuthentication / Mobile Security Researchers have discovered an inexpensive attack technique…

AceCryptor: Cybercriminals' Powerful Weapon, Detected in 240K+ Attacks

[ad_1] A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of…

New GobRAT Remote Access Trojan Targeting Linux Routers in Japan

[ad_1] May 29, 2023Ravie LakshmananLinux / Network Security Linux routers in Japan are the target…

Don’t Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims

[ad_1] A new phishing technique called "file archiver in the browser" can be leveraged to…

Critical OAuth Vulnerability in Expo Framework Allows Account Hijacking

[ad_1] May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed…