🚨 Android Alert 📱 SentinelLabs has uncovered a new spyware threat targeting mobile gamers, TikTok enthusiasts, and weapons enthusiasts through four dangerous apps. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. For all the details, read the full report by Alex Delamotte: https://s1.ai/CapraMix
SentinelOne’s Post
More Relevant Posts
-
Building and growing teams and solutions that impact the future. Delivering exceptional customer experience. Driving change through innovation. Inspiring and coaching others to dream more and do more. Sharing W-Ezz-dom.
SentinelLabs associates this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel: #Sentinelone #SentinelLabs #cybersecurity #security #datasecurity #internetsecurity #networksecurity #identitysecurity #cloudsecurity #containersecurity #securityawareness #cybercrime #malware #cyberattacks #cyberdefence #ethicalhacking #EDR #NDR #XDR #AI #digitalsafe #cybersafe #Cloud #containers #kubernetes #infosec #hacking #privacy #cyberdeception #deceptiontechnology
🚨📱 Android spyware news from SentinelLabs 🚨 We have identified four CapraRAT weaponized Android applications (APK) in a new spyware campaign that expands targeting to include mobile gamers, TikTok fans, and weapons enthusiasts. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. To learn more, read the full research report by Alex Delamotte: https://s1.ai/CapraMix
To view or add a comment, sign in
-
🚨📱 Android spyware news from SentinelLabs 🚨 We have identified four CapraRAT weaponized Android applications (APK) in a new spyware campaign that expands targeting to include mobile gamers, TikTok fans, and weapons enthusiasts. We associate this activity with the suspected state-sponsored threat actor Transparent Tribe, active since at least 2016 with attacks against Indian government and military personnel. To learn more, read the full research report by Alex Delamotte: https://s1.ai/CapraMix
To view or add a comment, sign in
-
Govt Issues Warning on 12 New Obscene Chat Apps The government has issued a warning about 12 new obscene chat apps, citing national security concerns. Allegedly utilized by Hostile Intelligence Agencies, these apps pose espionage threats, targeting both civilian and military personnel. The advisory urges immediate action and outlines precautionary measures against cyber threats. #obscenechat #Govt #Warning To read more click on link below in the comment
To view or add a comment, sign in
-
-
Russian cyber operators successfully hacked elements of the Ukrainian power system. They were inside for 2 months, undetected. They managed to CUT OFF THE POWER wartime realities. Again. With a cyberattack. That would normally be A HUGE EVENT. But kinetic strikes dwarf it so it becomes a footnote of this war. #cyberattack #ics #cyberoperation #cyberwar #cyberwarfare https://lnkd.in/dnFAU4aY
To view or add a comment, sign in
-
Sayari can be used to automatically generate a Hamas targeting org chart & business/financial order of battle. All of these top nodes and subnodes need to be attacked simultaneously via military, intelligence, financial, cyber, and law enforcement means. https://lnkd.in/ej6GWwbg
To view or add a comment, sign in
-
-
Head, Department of Defence Studies, CFC - Toronto Professor of History and War Studies at Royal Military College of Canada/Collège militaire royal du Canada
Such link analysis can be a powerful tool in the right hands.
Sayari can be used to automatically generate a Hamas targeting org chart & business/financial order of battle. All of these top nodes and subnodes need to be attacked simultaneously via military, intelligence, financial, cyber, and law enforcement means. https://lnkd.in/ej6GWwbg
To view or add a comment, sign in
-
-
Founder UK & CEO of Azured | Experts in cloud security across Azure and Microsoft 365. Microsoft Solutions Partner.
Earlier this year, a US airman pleaded guilty to leaking classified military documents to a group on messaging app, Discord – in one of the most serious US national security breaches in years. So where did it all go wrong? And if the US military can’t get it right, is there really any hope for the rest of us? Yes. Absolutely, yes. 🧐 🎩 Our top six ways to reduce malicious insider threat is now live on the blog: https://hubs.la/Q02pDfwW0 #CloudSecurity #InsiderThreat #MicrosoftSecurity #CyberThreat #CyberAttack #RBAC #Copilot #DataSecurity #DataCompliance #ZeroTrust #PrivilegedIdentityManagement
To view or add a comment, sign in
-
Expert in Public International Law Research | Humanitarian & Human Rights Enthusiast | Senior Lecturer | Lawyer | Compliance Subject Matter Expert.
Hacktivists/civilian hackers and their activities during armed conflicts (instead of war) are crucial topics. Additionally, one of the most important areas that requires revision pertains to 'Direct Participation in Hostilities,' particularly the criteria of direct causation and belligerent nexus when it comes to cyber operations in an armed conflict.
International lawyer & writer working on international humanitarian law, cyber operations, NSAGs and detention. Author of #OrganizingRebellion
Hacktivism in armed conflict has taken unprecedented levels. Mauro Vignati and I have pulled together 8 IHL-based rules that all hackers must respect, and recall 4 obligations of states to restrain them. No doubt: Cyber ops in war have limits – even hacktivists must them. Do not - attack civilian objects - attacks indiscriminately - harm civilians - harm medical and humanitarian facilities - harm indispensable objects & dangerous forces - spread terror https://t.co/SDDxkmLnbu
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them
ejiltalk.org
To view or add a comment, sign in
-
International lawyer & writer working on international humanitarian law, cyber operations, NSAGs and detention. Author of #OrganizingRebellion
Hacktivism in armed conflict has taken unprecedented levels. Mauro Vignati and I have pulled together 8 IHL-based rules that all hackers must respect, and recall 4 obligations of states to restrain them. No doubt: Cyber ops in war have limits – even hacktivists must them. Do not - attack civilian objects - attacks indiscriminately - harm civilians - harm medical and humanitarian facilities - harm indispensable objects & dangerous forces - spread terror https://t.co/SDDxkmLnbu
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them
ejiltalk.org
To view or add a comment, sign in
-
🚫 Unauthorized network access during exams and confidential meetings may lead to unfair advantages and information leaks. 🚫 Unauthorized phone use in sensitive locations like prisons and military facilities poses a serious security threat. Fear not. Sunwave offers cutting-edge security products, including managed services and comprehensive blocking capabilities, supporting scenarios from desktops to large complexes and venues. Guaranteeing robust protection. 🔐 #Sunwave #networksecurity #intelligentblocking
To view or add a comment, sign in
-