KEEP IN TOUCH
Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!
SnapMC Hackers Skip File Encryption And Just Steal Your Files A new actor tracked as SnapMC has emerged in the cybercrime space, performing the typical data-stealing extortion that underpins ransomware operations, but without doing the file encryption part. File encryption is considered a core component of ransomware attacks, as it’s the very element that brings
Study Reveals Android Phones Constantly Snoop On Their Users A new study by a team of university researchers in the UK has unveiled a host of privacy issues that arise from using Android smartphones. The researchers have focused on Samsung, Xiaomi, Realme, and Huawei Android devices, and LineageOS and /e/OS, two forks of Android that
Phishing Campaign Uses Math Symbols To Evade Detection Phishing actors are now using mathematical symbols on impersonated company logos to evade detection from anti-phishing systems. One notable case spotted by analysts at INKY involves the spoofing of Verizon, a large U.S.-based telecommunication service provider. In this case, the actors are using a square root symbol, a
PyPI Removes ‘mitmproxy2’ Over Code Execution Concerns The PyPI repository has removed a Python package called ‘mitmproxy2’ that was an identical copy of the official “mitmproxy” library, but with an “artificially introduced” code execution vulnerability. The official ‘mitmproxy’ Python library is a free and open-source interactive HTTPS proxy with over 40,000 weekly downloads. Copycat package could trick devs into falling for ‘newer’