article thumbnail

Iranian govt uses BouldSpy Android malware for internal surveillance operations

Security Affairs

Researchers at the Lookout Threat Lab have discovered a new Android surveillance spyware, dubbed BouldSpy, that was used by the Law Enforcement Command of the Islamic Republic of Iran (FARAJA). However, much of the victim data points to its broader usage, which indicates targeted surveillance efforts towards minorities within Iran.”

article thumbnail

Long-running surveillance campaigns target Uyghurs with BadBazaar and MOONSHINE spyware

Security Affairs

Lookout researchers discovered two long-running surveillance campaigns targeting the ethnic minority Uyghurs. Researchers from mobile security firm Lookout uncovered two long-running surveillance campaigns targeting the Uyghurs minority. List of installed packages. Call logs and geocoded location associated with the call.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Remcos RAT campaign targets US accounting and tax return preparation firms

Security Affairs

Microsoft warns of a new Remcos RAT campaign targeting US accounting and tax return preparation firms ahead of Tax Day. Tax Day, Microsoft has observed a new Remcos RAT campaign targeting US accounting and tax return preparation firms. Ahead of the U.S. The phishing attacks began in February 2023, the IT giant reported. LNK) files.

article thumbnail

One million cracked Poshmark accounts being sold online

Security Affairs

Login details of more than 36 million Poshmark accounts are available for sale in the cybercrime underground. “In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. Now Scott told BleepingComputer that a set of one million cracked Poshmark accounts is circulating online.

article thumbnail

Fake Emergency Search Warrants Draw Scrutiny from Capitol Hill

Krebs on Security

On Tuesday, KrebsOnSecurity warned that hackers increasingly are using compromised government and police department email accounts to obtain sensitive customer data from mobile providers, ISPs and social media companies. 30, Bug posted a sales thread to the cybercrime forum Breached[.]co Today, one of the U.S.

article thumbnail

Understanding and Recognizing Tech Abuse

SecureWorld News

charity and movement by the cybersecurity industry that supports more than 2,000 individuals and sole traders impacted by cybercrime and online harm every month. It encompasses various forms of cybercrime and online harm, including cyberstalking, tracking, hacking accounts and intimate image abuse.

article thumbnail

LLM Summary of My Book Beyond Fear

Schneier on Security

Surveillance creep risks violating autonomy. Accountability and Transparency – Ethical security requires checks against excessive power and oversight for responsibility. No accounting for psychology – Factoring human irrationality into policy is essential, not dismissed as “security theater.”