Cybersecurity Digest #28: 28/06/2021 – 09/11/2021

Cybersecurity News

Cybersecurity Blog Posts

Research and Analytics

  • Avast’s mobile threat team identified 2021’s biggest Android threats, and adware takes the cake. Analyzing all the threat intelligence they collected in the first five months of the year, Avast mobile threat researchers have been able to identify the greatest threats to Android devices in 2021. By a vast margin, the most common danger has been adware, making up 45% of the threats encountered so far this year.
  • Fortinet specialists have published threat report where dived into the inner workings of Diavol and its possible attribution to the criminal group known as Wizard Spider.
  • A home filled with smart devices could be exposed to more than 12,000 hacking or unknown scanning attacks from across the world in a single week, a new Which? investigation has found. They set up a test home in collaboration with NCC Group and IoT malware specialists, the Global Cyber Alliance (GCA), and the scale of scanning and hacking activity against the devices was breathtaking.
  • According to IDC Survey of 200 Security Decision Makers, 63% of Organizations Experienced Exposure of Sensitive Data. 98% of the companies surveyed had experienced at least one cloud data breach in the past 18 months compared to 79% last year. Meanwhile, 67% reported three or more such breaches, and 63% said they had sensitive data exposed.
  • Security researchers at the Lookout Threat Lab have identified over 170 Android apps, including 25 on Google Play, scamming people interested in cryptocurrencies. According to the analysis, they scammed more than 93,000 people and stole at least $350,000 between users paying for apps and buying additional fake upgrades and services.
  • ReversingLabs experts described the hidden risks behind off-the-shelf software supply chain components. They addressed the importance of validating third-party software components as a way to manage the risks that they can introduce and explained why some of these security risks can only be recognized by analyzing the final software product delivered to the customers.

Major Cyber Incidents