Social Blog News (2024)-  2024  2023  2022  2021  2020  2019  2018

AI blog  APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog  2024  2023

DATE

NAME

Info

CATEG.

WEB

24.5.24 TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead Trend Research has uncovered a novel social engineering campaign using TikTok’s vast user base to distribute information-stealing malware, specifically Vidar and StealC. Unlike the prevalent Fake CAPTCHA campaign — which relies on fake CAPTCHA pages and clipboard hijacking to trick users into running malicious scripts — this new campaign pivots to exploiting the popularity and viral nature of TikTok. Social blog Trend Micro
10.5.24 New Finance Scam Discovered Abusing Niche X/Twitter Advertising Loophole Silent Push Threat Analysts have uncovered a new finance scam exploiting an X/Twitter advertising display URL feature to spoof “cnn[.]com” while directing visitors to a crypto scam website impersonating Apple’s brand. Social blog Silent Push
25.4.25 Power Parasites: Job & Investment Scam Campaign Targets Energy Companies and Major Brands Silent Push Threat Analysts are tracking a scam campaign we’ve labeled “Power Parasites” that has been operating through a combination of deceptive websites, social media groups, and Telegram channels, primarily targeting individuals across Asian countries, including Bangladesh, Nepal, and India, with job and investment scams. Social blog Silent Push
19.4.25 Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger Google Threat Intelligence Group (GTIG) has observed increasing efforts from several Russia state-aligned threat actors to compromise Signal Messenger accounts used by individuals of interest to Russia's intelligence services. Social blog Google Threat Intelligence
12.4.25 Tik-Tok : China’s Digital Weapon System? U.S. President Donald Trump, once a critic but now a supporter of TikTok, is granting the app’s China-based parent company, ByteDance, a second 75-day extension to finalize a deal that would transfer ownership of TikTok to an American entity. Social blog Cyfirma

28.9.24

Time to engage: How parents can help keep their children safe on SnapchatHere’s what parents should know about Snapchat and why you should take some time to ensure your children can stay safe when using the appSocial blog

Eset

21.9.24

Influencing the influencers | Unlocked 403 cybersecurity podcast (ep. 6)How do analyst relations professionals 'sort through the noise' and help deliver the not-so-secret sauce for a company's success? We spoke with ESET's expert to find outSocial blog

Eset

27.7.24

Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android

ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos

Social blog

Eset

13.7.24

Cloudflare Zaraz adds support for server-side rendering of X and Instagram embedsWe are thrilled to announce Cloudflare Zaraz support for server-side rendering of embeds from X and Instagram. This allows for secure, privacy-preserving, and performant embedding without third-party JavaScript or cookies, enhancing security, privacy, and performance on your website... Social blogCloudflare

6.7.24

Social media and teen mental health – Week in security with Tony Anscombe

Social media sites are designed to make their users come back for more. Do laws restricting children's exposure to addictive social media feeds have teeth or are they a political gimmick?Social blogEset
6.4.24CoralRaider targets victims’ data and social media accountsCisco Talos discovered a new threat actor we’re calling “CoralRaider” that we believe is of Vietnamese origin and financially motivated. CoralRaider has been operating since at least 2023, targeting victims in several Asian and Southeast Asian countries.Social blogCisco Blog
2.3.2410 things to avoid posting on social media – and whyDo you often take to social media to broadcast details from your life? Here’s why this habit may put your privacy and security at risk.Social blogEset

14.1.24

Attack of the copycats: How fake messaging apps and app mods could bite youWhatsApp, Telegram and Signal clones and mods remain a popular vehicle for malware distribution. Don’t get taken for a ride.Social blogEset