Security

Russian state hackers using cyberweapons developed by Western spyware firms

The Russian government-backed threat actor Cozy Bear is attacking governments using the same exploits and code used by commercial cyber surveillance companies Intelexa or NSO Group, infamous for the Pegasus spyware.
Read more about Russian state hackers using cyberweapons developed by Western spyware firms

BlackByte ransomware still capitalizing on known VMware ESXi flaw

Despite multiple warnings and orders for US federal agencies to patch a vulnerability in VMware ESXi, an enterprise-class software for hosting virtual machines, ransomware operators are still taking advantage of it.
Read more about BlackByte ransomware still capitalizing on known VMware ESXi flaw

Researchers trace massive data leak to US data broker: why should you care

Sensitive data exposing a staggering amount of individuals continues to leak online, most likely originating from datasets belonging to People Data Labs.
Read more about Researchers trace massive data leak to US data broker: why should you care

The unmasking of threat actor USDoD

Less than a month after my interview with the infamous hacker USDoD, he was unceremoniously de-anonymized as Luan Goncalves, a 33-year-old man from Minas Gerais, Brazil. His OPSEC was laid bare for the world to see when Baptiste Robert, CEO and founder of Predicta Lab, used his company’s OSINT tools to break down the walls of his anonymity and expose his true identity.
Read more about The unmasking of threat actor USDoD

Tehran’s state-sponsored hackers helping cybergangs deploy ransomware

After they’re done spying for the government, the Iranian cyber army will trade access to victim organizations for money. The Federal Bureau of Investigation (FBI) warns that the state-sponsored group has a wide arsenal of tools to breach education, finance, healthcare, and defense organizations.
Read more about Tehran’s state-sponsored hackers helping cybergangs deploy ransomware

Apple, TikTok, Google, and Facebook give your data to law enforcement up to 80% of the time

Law enforcement can easily access your data, and some tech companies are willing to provide that information upon request. In fact, they comply 70% to 80% of the time.
Read more about Apple, TikTok, Google, and Facebook give your data to law enforcement up to 80% of the time

Chinese hackers exploit flaw in software used by telecoms

Chinese state-sponsored actors, known as Volt Typhoon or Bronze Silhouette, are actively exploiting a zero-day vulnerability in software used by many internet service providers and computer network management companies.
Read more about Chinese hackers exploit flaw in software used by telecoms

Muted Applause: leading software testing firm leaves credentials vulnerable

Applause, a leading software testing company, inadvertently left its credentials open to unauthorized visitors, allowing attackers to make a move for customer data.
Read more about Muted Applause: leading software testing firm leaves credentials vulnerable

Why Telegram’s out-of-the-box features don’t provide maximum security

Contrary to many messaging apps, Telegram doesn’t offer end-to-end encryption by default.
Read more about Why Telegram’s out-of-the-box features don’t provide maximum security

Almost a million affected by Young Consulting breach, BlackSuit ransomware claims responsibility

Software solutions provider Young Consulting, now known as Connexure, has notified 954,177 individuals in the US that their names and other personal identifiers were leaked in a data breach that occurred on April 10th, 2024.
Read more about Almost a million affected by Young Consulting breach, BlackSuit ransomware claims responsibility

Another critical WordPress plugin vulnerability found, over a million websites affected

WPML, a popular plugin for creating multilingual WordPress sites with more than a million active installations, was found to be vulnerable to server-side template injection attacks. It’s the third plugin requiring an urgent update in the last two weeks alone.
Read more about Another critical WordPress plugin vulnerability found, over a million websites affected

Large number of businesses exposed in 32 million document leak from ServiceBridge

Security researcher Jeremiah Fowler has discovered a massive exposed data chest belonging to ServiceBridge, a cloud-based field service management platform. The exposed data contains contracts, work orders, invoices, proposals, inspections, agreements, partial credit card numbers, and even HIPAA consent forms dated back to 2012.
Read more about Large number of businesses exposed in 32 million document leak from ServiceBridge

Illinois county leaked over 470K critical voter documents

One of the largest state counties in Illinois, St. Clair County, has had its voter data exposed. The county clerk’s office leaked sensitive documents used to verify voter registration lists.
Read more about Illinois county leaked over 470K critical voter documents

Chrome-stored passwords targeted by notorious ransomware group

Qilin ransomware, the criminal ring behind the chaos at London hospitals this summer, has evolved its tactics to harvest passwords from Google Chrome, Sophos X-Ops research has revealed.
Read more about Chrome-stored passwords targeted by notorious ransomware group

Meta: Iranian hackers target WhatsApp accounts of Trump, Biden staff

Meta says it had identified possible hacking attempts on the WhatsApp accounts of US officials from the administrations of both President Joe Biden and former President Donald Trump, blaming the same Iranian hacker group revealed earlier this month to have compromised the Trump campaign.
Read more about Meta: Iranian hackers target WhatsApp accounts of Trump, Biden staff

Impostor psychics plaguing social media

The reputation of psychics is being dragged through the mud by online impostors, who are preying on vulnerable people that seek answers through unconventional means.
Read more about Impostor psychics plaguing social media

Five million WordPress websites in danger due to critical LiteSpeed Cache vulnerability

LiteSpeed Cache, a very popular plugin used to speed up many WordPress websites, has an inherent vulnerability that allows attackers to completely take over sites by gaining administrator-level access.
Read more about Five million WordPress websites in danger due to critical LiteSpeed Cache vulnerability

Attackers draining bank accounts using new Android card cloning malware

A new malware can transmit an NFC (near-field communication) signal from one Android device to another held by a thief draining an account at an ATM.
Read more about Attackers draining bank accounts using new Android card cloning malware

Hackers target online shoppers in new Adobe e-commerce malware campaign

A new malware campaign that steals payment information from online shoppers is discovered lurking in dozens of e-commerce sites that use Adobe’s Magento platform, Malwarebytes said.
Read more about Hackers target online shoppers in new Adobe e-commerce malware campaign

Google Cloud leak linked to Shark Tank contestant exposes 83,000

A leaking Google Cloud Storage bucket linked to Alice’s Table, a Shark Tank contestant offering virtual floral arrangement classes, has exposed the personal data of over 83,000 customers.
Read more about Google Cloud leak linked to Shark Tank contestant exposes 83,000