Google warns Android users about a surge in SMS blaster attacks that exploit unsafe networks. These fake cell sites, known as Stingrays, trick phones into connecting and push out thousands of malicious texts. Disabling 2G connectivity is one of the most effective ways to stop such attacks. The Growing Threat to Android Devices Google warns […]
In a deeply concerning case of prolonged cyberespionage, the Chinese state-linked hacking group Weaver Ant (a subgroup of the larger APT41) was discovered to have infiltrated a telecom provider’s internal network for more than four years, from 2019 to mid-2023. The hackers deployed custom malware, including xDealer and LionsBot, targeting both Windows and Linux environments […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently identified critical vulnerabilities in Cisco, Hitachi, Microsoft, and Progress Software, exposing organizations to potential cyberattacks that could compromise sensitive data, disrupt operations, and facilitate unauthorized access. These vulnerabilities are actively being exploited by threat actors, heightening the urgency for immediate mitigation. As attackers continuously evolve […]