Capping off a busy week of charges and sanctions against Iranian hackers, a new research offers insight into what's a six-year-long ongoing surveillance campaign targeting Iranian expats and dissidents with an intention to pilfer sensitive information. The threat actor, suspected to be of Iranian origin, is said to have orchestrated the campaign with at least two different … [Read more...] about Researchers Uncover 6-Year Cyber Espionage Campaign Targeting Iranian Dissidents
Researchers
Researchers Reveal New Security Flaw Affecting China’s DJI Drones
Cybersecurity researchers on Thursday revealed security issues in the Android app developed by Chinese drone-maker Da Jiang Innovations (DJI) that comes with an auto-update mechanism that bypasses Google Play Store and could be used to install malicious applications and transmit sensitive personal information to DJI's servers.The twin reports, courtesy of cybersecurity firms … [Read more...] about Researchers Reveal New Security Flaw Affecting China’s DJI Drones
Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords
The same team of cybersecurity researchers who discovered several severe vulnerabilities, collectively dubbed as Dragonblood, in the newly launched WPA3 WiFi security standard few months ago has now uncovered two more flaws that could allow attackers to hack WiFi passwords.WPA, or WiFi Protected Access, is a WiFi security standard that has been designed to authenticate wireless … [Read more...] about Researchers Discover New Ways to Hack WPA3 Protected WiFi Passwords
Google Researchers Disclose PoCs for 4 Remotely Exploitable iOS Flaws
Google's cybersecurity researchers have finally disclosed details and proof-of-concept exploits for 4 out of 5 security vulnerabilities that could allow remote attackers to target Apple iOS devices just by sending a maliciously-crafted message over iMessage.All the vulnerabilities, which required no user interaction, were responsibly reported to Apple by Samuel Groß and Natalie … [Read more...] about Google Researchers Disclose PoCs for 4 Remotely Exploitable iOS Flaws