Category cyber-attacks

Unresolved DoS Vulnerability May Allow Anyone to Disrupt WordPress Sites

Recently, a significant application-level denial of service (DoS) vulnerability has been uncovered in the WordPress content management system (CMS). This flaw allows an attacker to incapacitate numerous WordPress sites using a single machine without the need for extensive bandwidth typically associated with distributed denial of service (DDoS) strategies. The vulnerability,…

Read MoreUnresolved DoS Vulnerability May Allow Anyone to Disrupt WordPress Sites

Cyber Espionage Group Launches Bitcoin Mining Malware Attacks on Asian Nations

Recent investigations by security experts at Bitdefender have unearthed a sophisticated malware campaign, dubbed Operation PZChao, which has been operational for several months, primarily targeting organizations in the government, technology, education, and telecommunications sectors across Asia and the United States. This custom malware is capable of executing several malicious activities,…

Read MoreCyber Espionage Group Launches Bitcoin Mining Malware Attacks on Asian Nations

Hackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Recent research from the Cybersecurity Research Center at Ben Gurion University, led by Mordechai Guri, has revealed alarming advancements in methods for extracting data from highly secure environments, specifically air-gapped PCs and systems located within Faraday cages. These devices are typically deemed secure due to their isolation from external networks,…

Read MoreHackers Can Now Access Data From Air-Gapped Computers Inside Faraday Cages

Moltbook: The AI Agent Social Network That Compromised Real Human Data

This week, an investigation by WIRED revealed critical insights into the face recognition app Mobile Fortify, utilized by ICE (Immigration and Customs Enforcement) and CBP (Customs and Border Protection) in efforts to identify individuals across the United States. However, it appears that the application’s design does not facilitate effective verification…

Read MoreMoltbook: The AI Agent Social Network That Compromised Real Human Data

Russian Scientists Arrested for Mining Bitcoins at Nuclear Weapons Facility

Russian Scientists Arrested for Cryptocurrency Mining at Nuclear Research Facility In a troubling incident underscoring the intersection of cybersecurity and illegal cryptocurrency activities, several engineers at a leading nuclear research facility in Russia were apprehended for allegedly mining cryptocurrency using resources meant for sensitive governmental work. This case, reflecting the…

Read MoreRussian Scientists Arrested for Mining Bitcoins at Nuclear Weapons Facility

Malicious Packages Target dYdX Cryptocurrency Exchange, Depleting User Wallets

Recent Malicious Code Injection Targets dYdX Developers Security researchers have uncovered a significant cybersecurity incident involving open-source packages published on npm and PyPI repositories. These packages were compromised with malicious code designed to steal wallet credentials from the dYdX development team and backend systems. As a result, both developers and…

Read MoreMalicious Packages Target dYdX Cryptocurrency Exchange, Depleting User Wallets

Malware Attack Disrupts Opening Ceremony of PyeongChang 2018 Winter Olympics

The PyeongChang Winter Olympics in South Korea experienced significant disruptions last weekend due to a sophisticated malware attack. The incident, which coincided with the opening ceremony, caused extensive downtime on the official event website and disrupted Wi-Fi connectivity in the main stadium. Journalists at the press center reported failures in…

Read MoreMalware Attack Disrupts Opening Ceremony of PyeongChang 2018 Winter Olympics

Hackers Take Advantage of Zero-Day Vulnerability in Telegram Messenger to Distribute Malware

A zero-day vulnerability has been identified in the desktop version of the end-to-end encrypted messaging application Telegram, specifically targeting the Windows client. This vulnerability has been actively exploited by cybercriminals to distribute malware designed to mine cryptocurrencies such as Monero and ZCash. This security flaw was uncovered by Alexey Firsh,…

Read MoreHackers Take Advantage of Zero-Day Vulnerability in Telegram Messenger to Distribute Malware