MoneyTaker: in pursuit of the invisible
Group-IB has uncovered a hacker group attacking banks in the USA and Russia. In less than two years, this group has conducted over 20 successful attacks on financial institutions andRead More →
Group-IB has uncovered a hacker group attacking banks in the USA and Russia. In less than two years, this group has conducted over 20 successful attacks on financial institutions andRead More →
AWS SSO will let users manage access to multiple AWS accounts and applications using their existing corporate credentials. Amazon Web Services’ re:Invent conference is wrapped up and in the bag,Read More →
A HomeKit vulnerability in the current version of iOS 11.2 has been demonstrated to 9to5Mac that allows unauthorized control of accessories including smart locks and garage door openers. Our understanding is Apple has rolledRead More →
A Banking Trojan called DOWNAD has been discovered after 9 years that is capable of remotely inject malicious code into a server and also performing Dictionary Attack which is ConsideringRead More →
HP Notebook Drivers contains Keylogger vulnerability that can be abused by hackers and steal the user’s information which could be affected with hundred of HP Notebook model. This critical vulnerability discoveredRead More →
Continuing our research into FinFisher – the infamous spyware known also as FinSpy and sold to governments and their agencies worldwide – we noticed that the FinFisher malware in ourRead More →
Microsoft has released an out-of-band patch for two severe flaws in Windows Defender. The flaws were discovered by the National Cyber Security Centre (NCSC), a unit of the UK’s spyRead More →
AT THIS POINT, it’s safe to assume that everyone’s been affected by one megabreach or another. But when the next Equifax debacle happens, know that there’s plenty you can do toRead More →
In this blog post, we will detail BlueSteal, or the ability to exploit multiple security failures in the Vaultek VT20i. These vulnerabilities highlight the need to include security auditsRead More →
A flaw in certificate pinning exposed customers of a number of high-profile banks to man-in-the-middle attacks on both iOS and Android devices. A vulnerability in the mobile apps of majorRead More →