The Córdoba Judiciary in Argentina has shut down its IT systems following a ransomware attack, which was allegedly carried out by the new ‘Play’ ransomware operation. The incident took place on Saturday, August 13th, and forced the Judiciary to shut…
Latest posts - Page 43
Titan M Attacking with Only One Byte
Introduction Titan M, a security chip included by Google in its Pixel smartphones starting with the Pixel 3, was examined over the course of the previous 18 months by Mr. Damiano Melotti, Mr. Maxime Rossi Bellom, and Mr. Philippe Teuwen.…
1,900 People Signal Phone Numbers Were Revealed By The Twilio Attack
Nearly 1,900 Signal users’ phone numbers were made public as a result of the data breach Twilio, a cloud communications provider, had at the beginning of the month. For Signal, Twilio offers phone number verification services. Last week, the company…
Discord Desktop – Remote Code Execution
Discord RCE Because Discord was being used for their Prototype Pollution study collaboration, the electrovolt team made the decision to pwn it. Since Discord uses ElectronJS for its desktop application, they must admit that at the time they started studying…
The Issue Of Cloud Isolation Is That Several Cloud Companies Are Impacted By PostgreSQL Flaws
How PostgreSQL-as-a-Service solutions from GCP, Azure, and other providers were found to have numerous connected vulnerabilities. The cloud has an isolation problem Tenant isolation is a core tenet of the cloud, and Wiz Research did substantial research on it over…
Three Microsoft-Signed Boot Loaders Have UEFI Secure Boot Bypasses, According To Researchers.
Unsigned third-party Unified Extensible Firmware Interface (UEFI) boot loaders that allow bypassing of the UEFI Secure Boot feature have been found to have a security feature bypass vulnerability. Hardware security company Eclypsium stated in a report shared with The Hacker…
GoTestWAF Expands API Attack Testing With Support For OpenAPI
Attendees at Black Hat USA have learned that the popular open-source hacking tool GoTestWAF has developed into the first utility of its kind to assess API security platforms. The security testing tool, which was introduced in April 2020, mimics OWASP…
Hackers Exploited Crypto Platform RenBridge To Launder $540 mn: Reports
More than half a billion dollars have been laundered in crypto assets originating from theft, fraud, ransomware and various other types of criminal activity since 2020, a new report has revealed The report by Blockchain analysis group Elliptic said one…
Supply Chain Cybersecurity: Everyone’s Responsibility
This week, I had a conversation with a new client who revealed that they are eager to solve various internal problems relating to their IT systems. They explained how their company has been negatively impacted by service failures and delays…
A New Hacker Forum Adopts A Pro-Ukrainian Position
The only aim of the politically motivated website DUMPS is threatening behavior against Russia and Belarus. Researchers have discovered that a new hacker forum is adopting an unusual political position to support Ukraine in its conflict with Russia by exclusively…