Topic: remote access

  • Android Malware Grants Attackers Remote Hands-On Control

    Android Malware Grants Attackers Remote Hands-On Control

    Klopatra is a new Android banking trojan that has infected over 3,000 devices in Europe by posing as a legitimate IPTV/VPN app, granting attackers full remote control to monitor screens and steal financial data. The malware, developed by a Turkish-speaking group, uses overlay attacks, VNC for hid...

    Read More »
  • Microsoft Teams Targeted by Fake IT Support Scams

    Microsoft Teams Targeted by Fake IT Support Scams

    A new wave of phishing attacks is exploiting Microsoft Teams, using fake IT support accounts to trick employees into installing malware that gives attackers full network control. Attackers are shifting from email to Teams due to its trusted role in business, impersonating IT staff to deploy remot...

    Read More »
  • Figma Opens Design Tools to AI Agents

    Figma Opens Design Tools to AI Agents

    Figma is integrating AI into its platform to enhance collaboration between designers and developers by giving AI models direct access to the core components of apps and prototypes. The expanded Model Context Protocol (MCP) server now allows AI to understand and interact with the actual code in Fi...

    Read More »
  • Top Infosec Products Launched This Week: October 2025

    Top Infosec Products Launched This Week: October 2025

    NowSecure launched a Privacy solution to detect and fix systemic vulnerabilities in mobile applications, helping organizations prevent unauthorized data leakage. Acronis integrated automated patch management for Windows and AI-driven threat detection into its True Image 2026 backup software to en...

    Read More »
  • Supply Chain Shifts Challenge CPS Security Strategies

    Supply Chain Shifts Challenge CPS Security Strategies

    Cyber-physical systems face heightened risks due to supply chain instability and regulatory changes, with 46% of organizations experiencing third-party breaches in the past year. External regulations, rather than internal assessments, are driving security strategies, and 76% of organizations expe...

    Read More »