Cybersecurity News
3 most dangerous types of Android malware
Here's what you should know about some of the nastiest mobile malware – from malicious software that takes phones and data hostage to RATs that allow hackers to control devices remotely
The post 3 most dangerous types of Android malware appeared first on WeLiveSecurity
Unpatched DNS Bug Puts Millions of Routers, IoT Devices at Risk

Chinese hackers perform 'rarely seen' Windows mechanism abuse in three-year campaign
Operation CuckooBees is an elaborate operation against companies in the US and beyond.Mozilla: Lack of Security Protections in Mental-Health Apps Is ‘Creepy’

What’s behind the record‑high number of zero days?
Organizations need to get better at mitigating threats from unknown vulnerabilities, especially as both state-backed operatives and financially-motivated cybercriminals are increasing their activity
The post What’s behind the record‑high number of zero days? appeared first on WeLiveSecurity
Russia to Rent Tech-Savvy Prisoners to Corporate IT?
Faced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage of qualified information technology experts: Forcing tech-savvy people within the nation's prison population to perform low-cost IT work for domestic companies.Bad Actors Are Maximizing Remote Everything

Deep Dive: Protecting Against Container Threats in the Cloud

Mozilla finds mental health apps fail 'spectacularly' at user security, data policies
Prayer apps, too, have raised serious security concerns.You Can Now Ask Google to Remove Your Phone Number, Email or Address from Search Results
Google said this week it is expanding the types of data people can ask to have removed from search results, to include personal contact information like your phone number, email address or physical address. The move comes just months after Google rolled out a new policy enabling people under the age of 18 (or a parent/guardian) to request removal of their images from Google search results.TA410 under the microscope – Week in security with Tony Anscombe
Here's what you should know about FlowingFrog, LookingFrog and JollyFrog – the three teams making up the TA410 espionage umbrella group
The post TA410 under the microscope – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Security Turbulence in the Cloud: Survey Says…

Cyberespionage APT Now Identified as Three Separate Actors

Vulnerable plugins plague the CMS website security landscape
Backdoors, card skimming, and spam are also common factors in website compromise.HackerOne acquires code security tester, review service PullRequest
HackerOne says that clients will be able to more easily integrate code security reviews during workflows.Attacker Breach ‘Dozens’ of GitHub Repos Using Stolen OAuth Tokens

Cyberattacks Rage in Ukraine, Support Military Operations

ExtraReplica: Microsoft patches cross-tenant bug in Azure PostgreSQL
The flaw was exploitable to conduct privilege escalation and code execution.Emotet is Back From ‘Spring Break’ With New Nasty Tricks
