The Microsoft Threat Intelligence Center (MSTIC) has found evidence of a fresh ransomware campaign using a hitherto unnamed ransomware payload that targets businesses in the logistics and transportation sectors in Poland and Ukraine. On October 11, we saw the introduction…
Latest posts - Page 30
The IT infrastructure was impacted by the Tata Power cyberattack, and the bill payment interface was down for a week.
R.K. Singh, the Union Power Minister, stated last month that the Electricity Amendment Bill’s provisions for frequent inspections. And prompt action will soon make India’s power network more future-proof and resistant to cyberattacks. On Friday, Tata Power reported that a…
The NPM Registry API may be subject to a new timing attack that exposes private packages.
Developers may be exposed to supply chain risks as a result of novel timing attacks uncovered against the registry API of the npm package manager. Threat actors can identify businesses’ scoped private packages by compiling a list of potential package…
Israeli Targets Are Attacked By Hackers with Iranian Ties
Commercial Cloud Storage Accounts are Used by Polonium for Command-and-Control Israeli groups are being targeted by an Iranian-affiliated advanced persistent threat cell operating out of Lebanon. The APT group known as Polonium targets businesses in a variety of industries. They…
The leak of Celsius Exchange data is a gift to thieves and digital sleuths alike.
The corporation exposed a significant violation in its consumers’ financial privacy by disclosing half a million users’ transactions in a bankruptcy court file. The paradoxical aspect of bitcoin privacy is that the blockchain, is the permanent record of all transactions…
An unauthorized WhatsApp Android app was discovered taking user accounts.
YoWhatsApp, an unauthorized WhatsApp Android app, has a new version that has been discovered to steal account access keys from users. YoWhatsApp is a fully functional chat app that uses the same permissions as the default WhatsApp app. And is…
Hackers trick victims into installing Android banking malware by using the Vishing scam.
The Vulnerability According to recent data from ThreatFabric, malicious actors are using voice phishing (vishing) techniques to trick victims into installing Android banking malware on their handsets. The Dutch mobile security firm claimed to have discovered a network of phishing…
UK government sounds alarm on tax scams
As people get ready to file their 2020–2022 tax returns, the UK government has issued a warning to be on the lookout for phoney tax rebate frauds (tax scams). Even in the best of circumstances, making sure your self-employed paperwork…
Information Regarding the Mango Markets Hack
A Hacker Wants the Victims of His Theft to Approve of His Robbery. When using cryptocurrencies, things operate differently. Having stolen $117 million in digital assets from decentralized finance exchange Mango Markets Hack, the hacker has now offered to return…
Widespread website hijack danger is caused by hidden DNS resolver vulnerabilities
WordPress installations at risk from a cache poisoning attack due to faked password resets. Security researchers caution that hidden DNS resolvers can be used to launch account takeover and email redirection attacks. The renowned network security researcher Dan Kaminsky originally…