Thousands Of Security Cameras Hacked, Exposing Tesla, US Jails, Hospitals
Companies whose footage was exposed include carmaker Tesla Inc. and software provider Cloudflare Inc. https://www.ndtv.com/world-news/thousands-of-security-cameras-hacked-exposing-tesla-jails-hospitals-2387447 […]
Chinese hackers targeted SolarWinds customers in parallel with Russian op
New data suggests that Russia wasn’t the only nation state hacking customers. https://arstechnica.com/gadgets/2021/03/chinese-hackers-targeted-solarwinds-customers-in-parallel-with-russian-op/ […]
New Side-Channel Attack Targets the CPU Ring Bus for the First Time
In a paper published today, a team of academics from the University of Illinois at Urbana-Champaign have published details about a new side-channel attack against […]
At Least 30,000 U.S. Organizations Newly Hacked Via Holes in Microsoft’s Email Software
At least 30,000 organizations across the United States — including a significant number of small businesses, towns, cities and local governments — have over the […]
Falcon Complete Stops Microsoft Exchange Server Zero-Day Exploits
This week, Microsoft reported a rare cybersecurity event: an ongoing mass exploitation of Microsoft Exchange servers by an alleged state-sponsored adversary, driven through a variety […]
Gootloader Hackers Poison Websites Globally in Order to Infect Business Professionals with Ransomware, Intrusion Tools and Bank Trojans, Warns eSentire
eSentire, a global provider of Managed Detection and Response (MDR) cybersecurity solutions, reported today that the hackers behind the malicious downloader, Gootloader, have poisoned websites […]
Hackers share methods to bypass 3D Secure for payment cards
Cybercriminals are constantly exploring and documenting new ways to go around the 3D Secure (3DS) protocol used for authorizing online card transactions. https://www.bleepingcomputer.com/news/security/hackers-share-methods-to-bypass-3d-secure-for-payment-cards/ […]
Ryuk Ransomware Updated With ‚Worm-Like Capabilities‘
Prolific Ransomware Can ‚Spread Automatically‘ Inside Networks, CERT-FR Warns https://www.bankinfosecurity.co.uk/ryuk-ransomware-updated-worm-like-capabilities-a-16080 […]
Brand(ed) Lures and GuLoader – The New Face of Email-based Attacks
After analyzing millions of emails, Cofense researchers have summarized some key patterns used during the attacks in the past year. According to them, cybercriminals are […]
Hackers Using Tricky SEO Technique to Deliver Malware Payloads
Cyberattackers are now using a novel attack technique in which they are using Google SEO to deploy malware payloads. This technique takes advantage of human […]
New nation-state cyberattacks
Today, we’re sharing information about a state-sponsored threat actor identified by the Microsoft Threat Intelligence Center (MSTIC) that we are calling Hafnium. Hafnium operates from […]
ENISA and CERT-EU sign Agreement to start their Structured Cooperation
The European Union Agency for Cybersecurity (ENISA) and the Computer Emergency Response Team for the EU Institutions, Bodies and Agencies (CERT-EU) are pleased to announce […]
Firewall Vendor Patches Critical Auth Bypass Flaw
Cybersecurity firm Genua fixes a critical flaw in its GenuGate High Resistance Firewall, allowing attackers to log in as root users. According to Genua. GenuGate […]
Hackers release a new jailbreak tool for almost every iPhone
An iPhone hacking team has released a new jailbreak tool for almost every iPhone, including the most recent models, by using the same vulnerability that […]
Far-Right Platform Gab Has Been Hacked – Including Private Data
The transparency group DDoSecrets says it will make the 70GB of passwords, private posts, and more available to researchers, journalists, and social scientists. https://www.wired.com/story/gab-hack-data-breach-ddosecrets/ https://ddosecrets.com/wiki/GabLeaks […]
China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions
This report details a campaign conducted by a China-linked threat activity group, RedEcho, targeting the Indian power sector. The activity was identified through a combination […]