Lemon Group Uses Millions of Pre-Infected Android Phones to Enable Cybercrime Enterprise
May 18 2023Lemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.
Read moreLemon Group's Guerrilla malware model an example of how threat actors are monetizing compromised Android devices, researchers say.
Read moreOrganizations can focus on these key considerations to develop their cybersecurity testing program sustainably.
Read moreCISA urges small and midsized organizations as well as critical infrastructure to implement mitigations immediately to shield themselves from further data exfiltration attacks.
Read morePro-Houthi OilAlpha uses spoofed Android apps to monitor victims across the Arab peninsula working to bring stability to Yemen.
Read moreDNS rebinding attacks are not often seen in the wild, which is one reason that browser makers have taken a slower approach to adopting the web security standard.
Read moreThe mobile phone and MacBook giant also rejected nearly 1.7 million app submissions last year in an effort to root out malware and fraud.
Read moreIt's as they say: A Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings, and Messages functions, and they all can be exploited.
Read morePending new SEC rules reinforce how integral cybersecurity is to modern business operations, and will help close the gap between security teams and those making policy decisions.
Read more"Up to $10 million for information that leads to the arrest and/or conviction of this defendant."
Read more
Recent Comments