16 Oct, 2024

TrickMo malware steals Android PINs using fake lock screen

Forty new variants of the TrickMo Android banking trojan have been identified in the wild, linked to 16 droppers and 22 distinct command and control (C2) infrastructures, with new features designed to steal Android PINs. This is being reported by Zimperium, following an earlier report by Cleafy that looked into some, but not all variants […]

3 mins read

Pokemon dev Game Freak confirms breach after stolen data leaks online

Japanese video game developer Game Freak has confirmed it suffered a cyberattack in August after source code and game designs for unpublished games were leaked online. Game Freak is best known for being the co-owner and the primary developing studio of the Pokémon series video game, which started in 1996 with the Pokémon Red and […]

2 mins read

Over 200 malicious apps on Google Play downloaded millions of times

Google Play, the official store for Android, distributed over a period of one year more than 200 malicious applications, which cumulatively counted nearly eight million downloads. The data was collected between June 2023 and April 2024 by threat intelligence researchers at Zscaler, who identified and analyzed malware families both on Google Play and other distribution platforms. […]

3 mins read

New FASTCash malware Linux variant helps steal money from ATMs

North Korean hackers are using a new Linux variant of the FASTCash malware to infect the payment switch systems of financial institutions and perform unauthorized cash withdrawals. Previous variants of FASTCash targeted Windows and IBM AIX (Unix) systems, but a new report by security researcher HaxRob reveals a previously undetected Linux version that targets Ubuntu […]

2 mins read

Google warns uBlock Origin and other extensions may be disabled soon

Google’s Chrome Web Store is now warning that the uBlock Origin ad blocker and other extensions may soon be blocked as part of the company’s deprecation of the Manifest V2 extension specification. “This extension may soon no longer be supported because it doesn’t follow best practices for Chrome extensions,” reads the Chrome Web Store page for […]

4 mins read

Iranian hackers now exploit Windows flaw to elevate privileges

The Iranian state-sponsored hacking group APT34, aka OilRig, has recently escalated its activities with new campaigns targeting government and critical infrastructure entities in the United Arab Emirates and the Gulf region. In these attacks, spotted by Trend Micro researchers, OilRig deployed a novel backdoor, targeting Microsoft Exchange servers to steal credentials, and also exploited the Windows […]

3 mins read

How to Fix Windows 11 Startup Problems: Troubleshooting Boot Issues

If Windows 11 doesn’t start properly, it could be because of different issues, from small software problems to big hardware failures. To fix these problems, you need to follow a step-by-step approach. First, try accessing the Windows Recovery Environment. There, you can use tools like ‘Startup Settings’ and ‘Safe Mode’ to figure out if a […]

14 mins read

Which Company Makes The Best Motherboards?

When building a PC, choosing the right motherboard is crucial as it serves as the central hub connecting all other parts of the computer. Motherboards come in different sizes and offer various features to meet different needs. It’s important to consider compatibility with CPUs, memory slots, peripheral ports, and additional features when looking for the […]

16 mins read

Ukraine arrests rogue VPN operator providing access to Runet

Ukraine cyber police have arrested a 28-year-old man who operated a massive virtual private network (VPN) service, allowing people from within the country to access the Russian internet (Runet). Runet is the portion of the internet that includes Russian sites on the “.ru” and “.su” top-level domains, including government sites, social media platforms, search engines, and […]

2 mins read

Microsoft deprecates PPTP and L2TP VPN protocols in Windows Server

Microsoft has officially deprecated the Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP) in future versions of Windows Server, recommending admins switch to different protocols that offer increased security. For over 20 years, the enterprise has used the PPTP and L2TP VPN protocols to provide remote access to corporate networks and Windows servers. […]

2 mins read