Category cyber-attacks

New Apache Struts RCE Vulnerability Allows Hackers to Compromise Web Servers

Critical Vulnerability Discovered in Apache Struts Framework A significant remote code execution vulnerability, designated CVE-2018-11776, has been disclosed in the widely used Apache Struts web application framework, which is crucial for numerous businesses globally. Semmle security researcher Man Yue Mo revealed that this flaw could enable remote attackers to execute…

Read MoreNew Apache Struts RCE Vulnerability Allows Hackers to Compromise Web Servers

US Government: House Sysadmin Steals 200 Phones,Captured by IT Department

The U.S. House of Representatives has been embroiled in a significant scandal involving unauthorized sales of government-issued devices. This incident highlights vulnerabilities not only in internal processes but also in the oversight of equipment procurement and asset management. The allegations center around Christopher Southerland, a 43-year-old system administrator for the…

Read MoreUS Government: House Sysadmin Steals 200 Phones,Captured by IT Department

Hacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

George Garofano Sentenced for High-Profile Celebrity Hack In a significant development within the cybersecurity landscape, George Garofano has been sentenced to eight months in prison for hacking into over 250 Apple iCloud accounts belonging to notable celebrities, including Jennifer Lawrence and Kim Kardashian. This sentencing follows his guilty plea to…

Read MoreHacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

Hundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Concerns Arise Over Fast Pair Vulnerabilities Found in Bluetooth Devices Recent investigations have uncovered significant vulnerabilities associated with Google’s Fast Pair technology, which could put connected devices at risk. Researchers at KU Leuven have identified flaws in the implementation of this widely adopted Bluetooth feature, raising alarms about the potential…

Read MoreHundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Thousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

Widespread Compromise of MikroTik Routers Exposes Vulnerabilities Recent reports have unveiled an alarming situation involving a significant number of MikroTik routers that have fallen victim to cyber exploitation. Last month, we noted a major crypto-mining malware operation responsible for the hijacking of over 200,000 MikroTik devices, utilizing a vulnerability linked…

Read MoreThousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Teen Arrested for Bomb Threats Linked to Cybercrime Group British authorities have taken a significant step in addressing cybercrime with the arrest of a 19-year-old individual associated with the notorious Apophis Squad. This group has been implicated in a series of hoax bomb threats directed at numerous educational institutions and…

Read More19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Mandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours

Microsoft’s NTLMv1 protocol, introduced in the 1980s alongside OS/2, has long been known for its vulnerabilities. Significant research, notably by cryptanalyst Bruce Schneier and Mudge in 1999, highlighted critical weaknesses in NTLMv1’s security architecture. This became alarmingly clear during the 2012 Defcon 20 conference, where researchers unveiled a toolkit that…

Read MoreMandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours