Security
Russian state hackers using cyberweapons developed by Western spyware firms
The Russian government-backed threat actor Cozy Bear is attacking governments using the same exploits and code used by commercial cyber surveillance companies Intelexa or NSO Group, infamous for the Pegasus spyware.
Read more about Russian state hackers using cyberweapons developed by Western spyware firms
BlackByte ransomware still capitalizing on known VMware ESXi flaw
Despite multiple warnings and orders for US federal agencies to patch a vulnerability in VMware ESXi, an enterprise-class software for hosting virtual machines, ransomware operators are still taking advantage of it.
Read more about BlackByte ransomware still capitalizing on known VMware ESXi flaw
Researchers trace massive data leak to US data broker: why should you care
Sensitive data exposing a staggering amount of individuals continues to leak online, most likely originating from datasets belonging to People Data Labs.
Read more about Researchers trace massive data leak to US data broker: why should you care
The unmasking of threat actor USDoD
Less than a month after my interview with the infamous hacker USDoD, he was unceremoniously de-anonymized as Luan Goncalves, a 33-year-old man from Minas Gerais, Brazil. His OPSEC was laid bare for the world to see when Baptiste Robert, CEO and founder of Predicta Lab, used his company’s OSINT tools to break down the walls of his anonymity and expose his true identity.
Read more about The unmasking of threat actor USDoD
Tehran’s state-sponsored hackers helping cybergangs deploy ransomware
After they’re done spying for the government, the Iranian cyber army will trade access to victim organizations for money. The Federal Bureau of Investigation (FBI) warns that the state-sponsored group has a wide arsenal of tools to breach education, finance, healthcare, and defense organizations.
Read more about Tehran’s state-sponsored hackers helping cybergangs deploy ransomware
Apple, TikTok, Google, and Facebook give your data to law enforcement up to 80% of the time
Law enforcement can easily access your data, and some tech companies are willing to provide that information upon request. In fact, they comply 70% to 80% of the time.
Read more about Apple, TikTok, Google, and Facebook give your data to law enforcement up to 80% of the time
Chinese hackers exploit flaw in software used by telecoms
Chinese state-sponsored actors, known as Volt Typhoon or Bronze Silhouette, are actively exploiting a zero-day vulnerability in software used by many internet service providers and computer network management companies.
Read more about Chinese hackers exploit flaw in software used by telecoms
Muted Applause: leading software testing firm leaves credentials vulnerable
Applause, a leading software testing company, inadvertently left its credentials open to unauthorized visitors, allowing attackers to make a move for customer data.
Read more about Muted Applause: leading software testing firm leaves credentials vulnerable
Why Telegram’s out-of-the-box features don’t provide maximum security
Contrary to many messaging apps, Telegram doesn’t offer end-to-end encryption by default.
Read more about Why Telegram’s out-of-the-box features don’t provide maximum security
Almost a million affected by Young Consulting breach, BlackSuit ransomware claims responsibility
Software solutions provider Young Consulting, now known as Connexure, has notified 954,177 individuals in the US that their names and other personal identifiers were leaked in a data breach that occurred on April 10th, 2024.
Read more about Almost a million affected by Young Consulting breach, BlackSuit ransomware claims responsibility
Another critical WordPress plugin vulnerability found, over a million websites affected
WPML, a popular plugin for creating multilingual WordPress sites with more than a million active installations, was found to be vulnerable to server-side template injection attacks. It’s the third plugin requiring an urgent update in the last two weeks alone.
Read more about Another critical WordPress plugin vulnerability found, over a million websites affected
Large number of businesses exposed in 32 million document leak from ServiceBridge
Security researcher Jeremiah Fowler has discovered a massive exposed data chest belonging to ServiceBridge, a cloud-based field service management platform. The exposed data contains contracts, work orders, invoices, proposals, inspections, agreements, partial credit card numbers, and even HIPAA consent forms dated back to 2012.
Read more about Large number of businesses exposed in 32 million document leak from ServiceBridge
Illinois county leaked over 470K critical voter documents
One of the largest state counties in Illinois, St. Clair County, has had its voter data exposed. The county clerk’s office leaked sensitive documents used to verify voter registration lists.
Read more about Illinois county leaked over 470K critical voter documents
Chrome-stored passwords targeted by notorious ransomware group
Qilin ransomware, the criminal ring behind the chaos at London hospitals this summer, has evolved its tactics to harvest passwords from Google Chrome, Sophos X-Ops research has revealed.
Read more about Chrome-stored passwords targeted by notorious ransomware group
Meta: Iranian hackers target WhatsApp accounts of Trump, Biden staff
Meta says it had identified possible hacking attempts on the WhatsApp accounts of US officials from the administrations of both President Joe Biden and former President Donald Trump, blaming the same Iranian hacker group revealed earlier this month to have compromised the Trump campaign.
Read more about Meta: Iranian hackers target WhatsApp accounts of Trump, Biden staff
Impostor psychics plaguing social media
The reputation of psychics is being dragged through the mud by online impostors, who are preying on vulnerable people that seek answers through unconventional means.
Read more about Impostor psychics plaguing social media
Five million WordPress websites in danger due to critical LiteSpeed Cache vulnerability
LiteSpeed Cache, a very popular plugin used to speed up many WordPress websites, has an inherent vulnerability that allows attackers to completely take over sites by gaining administrator-level access.
Read more about Five million WordPress websites in danger due to critical LiteSpeed Cache vulnerability
Attackers draining bank accounts using new Android card cloning malware
A new malware can transmit an NFC (near-field communication) signal from one Android device to another held by a thief draining an account at an ATM.
Read more about Attackers draining bank accounts using new Android card cloning malware
Hackers target online shoppers in new Adobe e-commerce malware campaign
A new malware campaign that steals payment information from online shoppers is discovered lurking in dozens of e-commerce sites that use Adobe’s Magento platform, Malwarebytes said.
Read more about Hackers target online shoppers in new Adobe e-commerce malware campaign
Google Cloud leak linked to Shark Tank contestant exposes 83,000
A leaking Google Cloud Storage bucket linked to Alice’s Table, a Shark Tank contestant offering virtual floral arrangement classes, has exposed the personal data of over 83,000 customers.
Read more about Google Cloud leak linked to Shark Tank contestant exposes 83,000