logo-default
  • HOME
  • ABOUT US
  • LITIGATION SUPPORT SERVICES
  • CYBER SECURITY SERVICES
  • BLOG
Return to previous page
Home Blog

Page 65

Read more

Experts detailed Microsoft Outlook flaw that can leak NTLM v2 hashed passwords

January 30, 2024 / 40 / 0
[ad_1] Experts detailed Microsoft Outlook flaw that can leak NTLM v2 hashed passwords Pierluigi Paganini January 29, 2024 A flaw in Microsoft Outlook can be exploited to access NTLM v2 hashed passwords by tricking users into opening a specially crafted file. The vulnerability CVE-2023-35636 impacting... Continue reading
Read more

Nigerian ‘Yahoo Boys’ Behind Social Media Sextortion Surge in the US

January 30, 2024 / 32 / 0
[ad_1] Teenagers from Western English-speaking countries are increasingly targeted by financial sextortion attacks conducted by Nigeria-based cybercriminals, the Network Contagion Research Institute (NCRI) has found. A majority of these happen on social media platforms like TikTok, Snapchat, Instagram, and Wizz. Financial sextortion, the illegal act... Continue reading
Read more

Mercedes-Benz accidentally exposed sensitive data, including source code

January 29, 2024 / 35 / 0
[ad_1] Mercedes-Benz accidentally exposed sensitive data, including source code Pierluigi Paganini January 29, 2024 Researchers discovered that Mercedes-Benz accidentally left a private key online exposing internal data, including the company’s source code. RedHunt Labs researchers discovered that Mercedes-Benz unintentionally left a private key accessible online,... Continue reading
Read more

Phobos Ransomware Family Expands With New FAUST Variant

January 29, 2024 / 28 / 0
[ad_1] Security researchers have recently uncovered a new variant of the notorious Phobos ransomware family named FAUST.  Phobos, which first emerged in 2019, encrypts files on victims’ computers and demands a ransom in cryptocurrency for the decryption key.  According to an advisory published by FortiGuard Labs... Continue reading
Read more

NSA buys internet browsing records from data brokers without a warrant

January 29, 2024 / 34 / 0
[ad_1] NSA buys internet browsing records from data brokers without a warrant Pierluigi Paganini January 29, 2024 The U.S. National Security Agency (NSA) admitted to buying internet browsing records from data brokers to monitor Americans’ activity online without a court order. U.S. Senator Ron Wyden,... Continue reading
Read more

US Senator Exposes NSA Purchase of Americans’ Internet Records

January 29, 2024 / 35 / 0
[ad_1] US Senator Ron Wyden of Oregon has unveiled documents last week substantiating claims that the National Security Agency (NSA) is actively purchasing internet browsing records of American citizens.  These records, capable of disclosing individuals’ visited websites and app usage, have prompted Senator Wyden to call... Continue reading
Read more

Ukraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’

January 29, 2024 / 33 / 0
[ad_1] Ukraine’s SBU arrested a member of Pro-Russia hackers group ‘Cyber Army of Russia’ Pierluigi Paganini January 29, 2024 Ukraine’s security service, the SBU, announced that it has identified and detained an alleged member of the pro-Russia hacker group known as the Cyber Army of Russia.... Continue reading
Read more

Dark Web Drugs Vendor Forfeits $150m After Guilty Plea

January 29, 2024 / 26 / 0
[ad_1] A prolific dark web drugs vendor has pleaded guilty and agreed to forfeit $150m, the largest single seizure ever taken by the US Drug Enforcement Administration (DEA). Banmeet Singh, 40, of Haldwani, India, sold controlled substances including fentanyl, LSD, ecstasy, Xanax, ketamine and tramadol... Continue reading
Read more

Multiple PoC exploits released for Jenkins flaw CVE-2024-23897

January 29, 2024 / 33 / 0
[ad_1] Multiple PoC exploits released for Jenkins flaw CVE-2024-23897 Pierluigi Paganini January 28, 2024 Multiple proof-of-concept (PoC) exploits for recently disclosed critical Jenkins vulnerability CVE-2024-23897 have been released. Researchers warn that several proof-of-concept (PoC) exploits targeting the recently disclosed critical Jenkins vulnerability, CVE-2024-23897, have been... Continue reading
Read more

North Korea Hacks Crypto: More Targets, Lower Gains

January 29, 2024 / 40 / 0
[ad_1] North Korea-backed threat actors hacked more crypto platforms than ever in 2023 but stole less of the digital currency in total than in 2022. Crypto research firm Chainalysis has found that North Korean adversaries stole slightly over $1.0bn in 2023, compared with around $1.7bn... Continue reading
Next Page »

Search