An unknown attacker tried to install a bitcoin miner on tens of thousands of unauthenticated Redis servers that were accessible via the internet. If all of these hosts were successfully compromised is not yet known. However, it was made feasible…
Latest posts - Page 36
Chromium’s prototype pollution bug disregarded the Sanitizer API
The problem illustrates difficulties in blocking client-side assaults. An attack-bypassing Sanitizer API, a built-in browser library for eliminating potentially harmful code from user-controlled input sources. This was made possible by a prototype pollution problem in the Chromium project. A specific…
Reward points: Scam mobile banking incentives apps tempt users to download RATs that steal personal information on Android smartphones.
Our examination of a fresh iteration of previously disclosed Android malware that steals user information through Reward points scam. They are also distributed through an ongoing SMS campaign that shows how mobile threats are always evolving. This latest version poses…
Use of LinkedIn Smart Links in cunning email phishing scams
Phishing actors are successfully rerouting targeted users to phishing pages that collect payment information by leveraging LinkedIn’s Smart Link function to get beyond email security measures. Users of LinkedIn Sales Navigator and Enterprise are entitled to the Smart Link function,…
From the cryptocurrency market creator Wintermute, hackers steal $162 million.
Evgeny Gaevoy, the CEO of Wintermute, said that the company had been hacked and had lost $162.2 million in DeFi operations. Over 50 cryptocurrency exchanges and trading platforms, such as Binance, Coinbase, Kraken, and Bitfinex, receive liquidity via Wintermute. With…
Phishing attacks using Microsoft 365 pose as US government agencies.
A continuous phishing attacks that targets U.S. government contractors has grown in scope and is now pushing more effective lures and documents. These phishing emails entice victims by offering them the chance to submit bids for lucrative government projects. This…
Uber attributes a recent security breach to the LAPSUS$ hacking group
Uber provided additional information on the security problem that occurred last week on Monday. Uber attributed the attack to a threat actor it thinks to be connected to the infamous LAPSUS$ hacker ring. The San Francisco-based company stated in an…
FBI Warns of Increase in Payment Scams in the Healthcare Sector
Cybercriminals use phishing and social engineering to divert payments. FBI Warns of Increase in Payment Scams in the Healthcare Sector. The FBI alerts the healthcare sector that cybercriminals are stealing multimillion-dollar payouts from healthcare payment processors by stealing user login…
Quantum and BlackCat Ransomware Distribution Started by the Emotet Botnet
Following Conti’s official retirement from the threat scene this year, ransomware-as-a-service (RaaS) organizations like Quantum and BlackCat Ransomware are now using the Emotet malware. Emotet began as a banking trojan in 2014, with time, upgraded and transformed the virus into…
Ransomware-as-a-Service First $50K Bounty Paid by Gang LockBit
FBI agent thanked by a group for inside knowledge of weaknesses As part of its bug bounty programme for researchers ready to assist in cybercrime, the LockBit ransomware-as-a-service organization. LockBit has paid the first payment of $50,000. The ransomware collective…