Google

APT Groups and Ransomware Groups Collaborate to Mask Cyber Espionage Campaigns

Reports by Google Cloud and Trellix indicate there is growing collaboration between nation-state actors and cybercriminal networks for help with initial access and the use of custom malware sold on underground forums.
September 2, 2024

State-Backed Attackers and Commercial Surveillance Vendors Repeatedly Use the Same Exploits

Russian hackers exploited vulnerabilities in Safari and Chrome to launch cyberattacks from November 2023 to July 2024. They used a watering hole attack on Mongolian government websites to infect mobile users with malware, stealing information.

Government-Backed Actors Exploiting WinRAR Vulnerability

The recent campaigns targeting various sectors, including the energy and government sectors, highlight the effectiveness of known vulnerabilities even with available patches, emphasizing the importance of proactive software security measures.

Active North Korean Campaign Targeting Security Researchers

A new campaign has been discovered with similarities to a previous campaign, including the use of social media sites to build rapport with targets. The threat actors then engage in encrypted messaging and send a malicious file with a 0-day exploit.

Android 14 Introduces First-Of-Its-Kind Cellular Connectivity Security Features

Android 14 introduces new security measures to mitigate the risks associated with 2G networks, allowing users and enterprises to disable 2G connectivity and protect against potential attacks.

A Year in Review of Zero-Days Exploited In-the-Wild in 2022

The shift towards zero-click exploits and new browser mitigations has led to a decrease in browser zero-days, but attackers are still finding ways to exploit vulnerabilities in other components.

Protect and manage browser extensions using Chrome Browser Cloud Management

Chrome Browser Cloud Management offers extension management capabilities and reporting to enable organizations to control extension usage and mitigate potential security risks.

Google announces the launch of GUAC v0.1

According to Google, GUAC aggregates software security metadata and maps it to a standard vocabulary of concepts relevant to the software supply chain. They explained that this data can be accessed via a GraphQL interface.

Announcing the deps.dev API: critical dependency data for secure supply chains

As part of Google’s ongoing efforts to improve open-source security, the Open Source Insights team has built a reliable view of software metadata across five packaging ecosystems.

Spyware Vendors Use 0-days and n-days Against Popular Platforms

In this blog, researchers have shared details about two distinct campaigns that used various 0-day exploits against Android, iOS, and Chrome and were both limited and highly targeted.

Defend Against Threats with Cyber Fusion

Cyware is the leading provider of cyber fusion solutions that power threat intelligence sharing , end-to-end automation and 360-degree threat response.

Trending Tags