Following yet another wave of DeadBolt ransomware attacks using a zero-day vulnerability in the software, QNAP has released a fresh alert asking users of its network-attached storage (NAS) devices to upgrade to the most recent version of Photo Station. According…
Latest posts - Page 40
SharkBot Malicious Software Returns To Google Play To Steal Your Logins
SharkBot malicious software, which targets Android users’ banking logins through apps with tens of thousands of installations, has made a comeback in the Google Play Store. Two Android apps that were submitted to Google’s automatic review did not contain any…
Snowballing BianLian Ransomware Gang Activity Spotted by Researchers
The developers of the cutting-edge cross-platform ransomware BianLian accelerated their operational tempo this month by expanding their command-and-control infrastructure. Organizations in Australia, North America, and the United Kingdom have already been attacked by BianLian Ransomware Gang, a new competitor in…
A Global Foundational ID System That Will Provide Identity To Millions Of People
Worldwide, there are one billion persons without a legal identity document, which is necessary for inclusion in society and the economy. In low-income nations, one in every two women lacks an ID, which restricts their access to essential services and…
20,000 people were affected by the San Francisco 49ers cybersecurity incident
In February, the BlackByte Ransomware-as-a-Service Group claimed 49ers as victims. More than 20,000 Americans will be notified by the San Francisco 49ers cybersecurity that online attackers stole their name and Social Security number in a February network security incident. With…
Samsung Admits Data Breach Exposed Personal Information of Some US Customers
Samsung, a South Korean conglomerate, announced on Friday that it had experienced a cybersecurity incident. in Samsung Data Breach, It resulted in unauthorized access to some customer information, the second such incident this year. “In late July 2022, an unauthorized…
Dev Backdoors Create Their Own Malware To Steal Information From Other Hackers
Cybercriminals who use Prynt Stealer to collect data from victims are duped by the malware developer, who also receives a copy of the information via Telegram. The malware developer inserted a backdoor into the infostealer builder, which is present in…
Using Hackability to find a Chrome data leak
Gareth Heyes has been hacking browsers for over 15 years, and one of his goals was to find an SOP bypass or information leak in every major browser. Chrome was the only browser left standing…until now. This post explains how…
A New Ransomware Attack Has Hit The Windows and Linux Servers of A Chile Government Agency
Chile’s national computer security and incident response team (CSIRT) has announced that a ransomware attack has impacted the country’s government agency’s operations and online services. The ransomware attack began on Thursday, August 25, and targeted the agency’s Microsoft and VMware…
Hackers Take Advantage of Users’ Desire to be Verified by Instagram
Threat actors harvest user credentials by exploiting Instagram’s highly sought-after verification programme. Vade discovered a sophisticated and targeted phishing campaign aimed at luring Instagram users into a trap and stealing their personal information and account credentials. It starts by email…