In today’s hyper-connected world, our smartphones have become an extension of ourselves. They hold a treasure trove of personal and financial information, from social media accounts and emails to banking details and online shopping credentials. This dependence on our mobile devices necessitates keeping them charged, and often, we find ourselves relying on public charging stations […]
An emerging threat from a hacker group affiliated with Hamas has targeted Israeli businesses, employing a destructive type of malware named BiBi. This malware, identified for its data-wiping capabilities, significantly disrupts the restoration of data following cyber incursions. Recent incidents in Israel have unveiled a surge in cyberattacks orchestrated by pro-Hamas hackers wielding the BiBi […]
Researchers at Palo Alto Networks’ Unit 42 have uncovered a new variant of the Bifrost Malware, a Remote Access Trojan (RAT), specifically targeting Linux systems. This latest iteration employs several novel evasion techniques, including the use of a deceptive domain designed to bypass security measures and compromise unsuspecting users. Bifrost, first identified two decades ago, […]