Category cyber-attacks

Hacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

George Garofano Sentenced for High-Profile Celebrity Hack In a significant development within the cybersecurity landscape, George Garofano has been sentenced to eight months in prison for hacking into over 250 Apple iCloud accounts belonging to notable celebrities, including Jennifer Lawrence and Kim Kardashian. This sentencing follows his guilty plea to…

Read MoreHacker Sentenced to 8 Months in Prison for Leaking Celebrities’ Private Photos

Hundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Concerns Arise Over Fast Pair Vulnerabilities Found in Bluetooth Devices Recent investigations have uncovered significant vulnerabilities associated with Google’s Fast Pair technology, which could put connected devices at risk. Researchers at KU Leuven have identified flaws in the implementation of this widely adopted Bluetooth feature, raising alarms about the potential…

Read MoreHundreds of Millions of Audio Devices Require Urgent Patch to Thwart Wireless Hacking and Tracking

Thousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

Widespread Compromise of MikroTik Routers Exposes Vulnerabilities Recent reports have unveiled an alarming situation involving a significant number of MikroTik routers that have fallen victim to cyber exploitation. Last month, we noted a major crypto-mining malware operation responsible for the hijacking of over 200,000 MikroTik devices, utilizing a vulnerability linked…

Read MoreThousands of MikroTik Routers Compromised for Network Traffic Eavesdropping

19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Teen Arrested for Bomb Threats Linked to Cybercrime Group British authorities have taken a significant step in addressing cybercrime with the arrest of a 19-year-old individual associated with the notorious Apophis Squad. This group has been implicated in a series of hoax bomb threats directed at numerous educational institutions and…

Read More19-Year-Old Hacker Taken into Custody for False Bomb Threats at Schools and Airplanes

Mandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours

Microsoft’s NTLMv1 protocol, introduced in the 1980s alongside OS/2, has long been known for its vulnerabilities. Significant research, notably by cryptanalyst Bruce Schneier and Mudge in 1999, highlighted critical weaknesses in NTLMv1’s security architecture. This became alarmingly clear during the 2012 Defcon 20 conference, where researchers unveiled a toolkit that…

Read MoreMandiant Unveils Rainbow Table Capable of Breaking Weak Admin Passwords in Just 12 Hours