Researchers discovered a vulnerability in Android devices that allows malware to hijack legitimate apps. Using this vulnerability, cybercriminals could trick users into granting permissions to their malicious apps and provide openings for phishing pages.
With the growing popularity of remote working arrangements in enterprises, we revisit the security threats and recommendations for IoT devices interchangeably connected to the network at home and in the office.
The threat actors operating the Emotet malware broke its nearly four-month hiatus by launching a spate of malicious spam emails targeting German-, Italian-, Polish-, and English-speaking users.
A look into the cybersecurity risks surrounding critical infrastructures integrated with industrial internet of things (IIoT), and the recommendations to mitigate against these threats.
Cybercriminal group FIN8 reappeared with new PoS malware Badhatch, capable of scraping credit card data, installing a backdoor, and allowing remote access, among other routines.
New mobile malware Agent Smith targets Android devices to install malicious versions of popular apps. The malware displays fraudulent ads for the attackers' financial gain but can be further used for bigger attacks. Google has removed the malicious apps.