The malicious software library can collect installed app lists, Wi-Fi and Bluetooth data, and more
More Stories
Friday Squid Blogging: Beaked Whales Feed on Squid
A Travers’ beaked whale (Mesoplodon traversii) washed ashore in New Zealand, and scientists conlcuded that “the prevalence of squid remains...
AWS Announces £5m Grant for Cyber Education in the UK
Amazon Web Services has launched its Cyber Education Grant Program in the UK Read More
Russian Scammers Target Crypto Influencers with Infostealers
Crazy Evil, a group of crypto scammers, exploit NFTs and cryptocurrencies with malware targeting influencers and tech professionals Read More
North Korean IT Workers Holding Data Hostage for Extortion, FBI Warns
A new FBI advisory warned that North Korean IT worker schemes have escalated their activities in recent months to include...
Be careful what you say about data leaks in Turkey, new law could mean prison for reporting hacks
The Turkish government is proposing a controversial new cybersecurity law that could make it a criminal act to report on...
Ransomware Gangs Linked by Shared Code and Ransom Notes
SentinelOne researchers highlighted similarities in the approaches used by the HellCat and Morpheus ransomware groups, suggesting shared infrastructure Read More