Xenomorph malware has reemerged in a new distribution campaign, expanding its scope to target over 30 US banks along with various financial institutions worldwide. Cybersecurity analysts from ThreatFabric recently uncovered this resurgence, which relies on deceptive phishing webpages posing as a Chrome update to trick victims into downloading malicious APKs. Xenomorph first came to the
Philip Choo
Dear Naked Security readers, Firstly, thank you for your interest, your time, and your contributions to the Naked Security community. Your invaluable engagement and expertise have helped improve cybersecurity for everyone. We have recently added the extensive catalog of Naked Security articles to the Sophos News blog platform, enabling us to provide all Sophos security
Sep 26, 2023THNEndpoint Security / Password Microsoft is officially rolling out support for passkeys in Windows 11 today as part of a major update to the desktop operating system. The feature allows users to login to websites and applications without having to provide a username and password, instead relying on their device PIN or biometric
OpenAI is in discussions to possibly sell shares in a move that would boost the company’s valuation from $29 billion to somewhere between $80 billion and $90 billion, according to a Wall Street Journal report citing people familiar with the talks. In April, OpenAI picked up just over $300 million in funding from backers such
GIC is in talks to invest in the Indian startup Vegrow, which runs a business-to-business marketplace for fruits, two sources familiar with the matter said. The Singapore sovereign fund is evaluating leading a $40 million Series C funding round in Vegrow, the sources said. The talks, which have not finalized and so the terms could
Unit 42 researchers have unveiled a web of complex cyber-espionage attacks targeting a government in Southeast Asia. While initially thought to be the work of a single threat actor, the researchers discovered that the attacks were orchestrated by three separate and distinct clusters of threat actors. These espionage operations, occurring simultaneously or nearly so, affected
Sep 25, 2023THNCyber Attack / Phishing Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to deliver a Go-based open-source post-exploitation toolkit called Merlin. “Since drones or Unmanned Aerial Vehicles (UAVs) have been an integral tool used by the Ukrainian military, malware-laced lure files themed as UAVs service
Storybutton, a new audio player for kids, aims to be the go-to alternative to screened devices for the 12 and under set. Created by kid-friendly podcaster Jim Jacob (“Mr. Jim”), Storybutton wants to improve the way kids listen by moving the podcast experience off phones and tablets. Storybutton costs $99.99 and features an easy-to-use design
Amazon said Monday it has agreed to invest up to $4 billion in the AI startup Anthropic as the e-commerce group steps up rivalry against Microsoft, Meta, Google and Nvidia in the fast-growing sector that many technologists believe could be the next great frontier. The e-commerce group said it will initially invest $1.25 billion for
Security researchers at SentinelLabs, in collaboration with QGroup, have unveiled a new threat actor known as Sandman. This unidentified group has been launching targeted attacks on telecommunications providers in regions including the Middle East, Western Europe and South Asia. According to an advisory published by SentinelLabs on Thursday, Sandman’s tactics are marked by stealthy lateral movements
For years, the Middle East has maintained its reputation as a fertile ground for advanced persistent threats (APTs). In the midst of routine monitoring of suspicious activities on the systems of high-profile customers, some based in this region, ESET Research stumbled upon a very sophisticated and unknown backdoor that we have named Deadglyph. We derived
Even in today’s cloud-based environments, USB drives are a useful tool. Removable media can perform a variety of tasks, among them quick transfers between systems on different networks or moving installation and configuration files to air-gapped networks. Optical media, such as CDs and DVDs, are also still found in some networks. For all their versatility,
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit chain in an attempt to deliver a spyware strain called Predator targeting former Egyptian member of parliament Ahmed Eltantawy between May and September 2023. “The targeting took place after Eltantawy publicly stated his plans to run
The person a founder chooses to back their company is important beyond the capital these investors provide. Each backer brings specific experiences and networks that can help founders in various ways. Getting the right people involved in a company early is instrumental in helping it grow. Ashley Mayer, a co-founder and GP at Coalition Operators;
Welcome to the TechCrunch Exchange, a weekly startups-and-markets newsletter. It’s inspired by the daily TechCrunch+ column where it gets its name. Want it in your inbox every Saturday? Sign up here. The Perkins School for the Blind has identified over 1,400 companies that are designing and building products specifically for people with disabilities. I met
Video Two ESET malware researchers took to the LABScon stage this year to deconstruct sophisticated attacks conducted by two well-known APT groups 22 Sep 2023 The lineup of speakers at this year’s edition of LABScon featured two ESET malware researchers who took to the stage to deconstruct sophisticated attacks conducted by two well-known APT groups.
The year 2023 has seen a surge of over 700 advertisements on the dark web offering Distributed Denial of Service (DDoS) attacks through Internet of Things (IoT) devices, suggests a new report by Kaspersky. These services come at varying price points, depending on factors like DDoS protection and verification on the target’s end, ranging from
Sep 23, 2023THNCyber Espionage / Malware Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth Falcon as part of a cyber espionage campaign. “Deadglyph’s architecture is unusual as it consists of cooperating components – one a native x64 binary, the other a .NET assembly,” ESET
Welcome to Week in Review (WiR), TechCrunch’s regular newsletter covering the past few days in tech. The TC crew — including this reporter — is coming off the high of Disrupt, which hopefully some of you, dear readers, were able to attend in person. Fret not if you didn’t — there’s always next year, and
PhonePe launched the Indus AppStore Developer Platform on Saturday, promising no platform fee or commission on in-app purchases as the Walmart-backed fintech races to win Android developers in Google’s largest market. The Bengaluru-headquartered startup, which has amassed over 450 million registered users on its payments app, said developers can start registering and uploading their apps
The US Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Football League (NFL), Allegiant Stadium and Super Bowl LVIII partners, has conducted a cybersecurity tabletop exercise this week in preparation for Super Bowl LVIII. The exercise aimed to assess and enhance cybersecurity response capabilities, plans and procedures for the upcoming event. The Super
Sep 22, 2023THNMalware / Cyber Threat An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok, particularly users in Brazil and Mexico. “The BBTok banker has a dedicated functionality that replicates the interfaces of more than 40 Mexican and Brazilian banks, and tricks the victims into entering
AquaLith has its eye on a billion-dollar market opportunity: new types of battery cell components that don’t rely on the scarce metals normally used in lithium-ion battery packs, which are increasingly in demand with the rise of electric vehicles. According to McKinsey & Company, revenues along the lithium-ion battery value chain will grow from $85
ESET researchers have analyzed two campaigns by the OilRig APT group: Outer Space (2021), and Juicy Mix (2022). Both of these cyberespionage campaigns targeted Israeli organizations exclusively, which is in line with the group’s focus on the Middle East, and used the same playbook: OilRig first compromised a legitimate website to use as a C&C
Meta-owned Twitter rival Threads has finally added a way to switch between multiple accounts without logging out. The social networking app announced Thursday that users can now swap accounts on its mobile apps by long pressing on the profile icon in the bottom right. Users can tap on the “Add profile” option after the long
The UK government has announced its decision to establish a data bridge with the US, enabling the free flow of personal data between the two regions. Adequacy regulations have been laid out in the UK Parliament on September 21, 2023, to give effect to this decision, with the regulations due to come into force from
DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a Hypertext Transfer Protocol Secure encrypted session. DoH seeks to improve online privacy by hiding DNS queries from view. DoH works similarly to DNS, but HTTPS sessions keep the requests and minimize the information exchanged
Sep 21, 2023THNTelecom Security / Cyber Attack A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation providers in the Middle East, Western Europe, and the South Asian subcontinent. Notably, the intrusions leverage a just-in-time (JIT) compiler for the Lua programming language known as LuaJIT as
Ten years ago, Brad Brochocki was working for a solar startup in Denver. At the end of the year, the owners said they couldn’t give a holiday cash bonus, but instead wanted to give Brochocki more equity in the company. “I was in my young 20s at the time and equity wasn’t something that really
During the last two days, 20 startups pitched their companies as part of TechCrunch Startup Battlefield at Disrupt 2023. These 20 companies were selected as the best of the Startup Battlefield 200 and competed for a chance to take home the Startup Battlefield Cup and $100,000. Expert judges asked the hard questions after the onstage