Category cyber-attacks

Prowli Malware Aims at Servers, Routers, and IoT Devices

After the recent discovery of the VPNFilter malware botnet, researchers have revealed another significant threat in the cybersecurity landscape: Operation Prowli. This extensive operation has already compromised over 40,000 servers, modems, and other internet-connected devices from a diverse array of organizations worldwide. Operation Prowli employs various attack techniques, including the…

Read MoreProwli Malware Aims at Servers, Routers, and IoT Devices

Nike Data Breach Allegations Emerge as WorldLeaks Releases 1.4TB of Files Online

In the wake of the Under Armour data breach, the rebranded Hunters International ransomware group, now known as WorldLeaks, has asserted that it has successfully targeted Nike, Inc., a prominent U.S.-based athletic footwear and apparel company. This development is being closely monitored by cybersecurity professionals and business owners alike. WorldLeaks…

Read MoreNike Data Breach Allegations Emerge as WorldLeaks Releases 1.4TB of Files Online

Adobe Releases Patch for Actively Exploited Flash Player Zero-Day Vulnerability

Adobe has issued a critical security update for its Flash Player, addressing a zero-day vulnerability that is currently under active exploitation. This flaw poses significant risks to Windows users, with attacks being specifically aimed at individuals in the Middle East, leveraging crafted Excel documents as vectors for the exploit. Discovered…

Read MoreAdobe Releases Patch for Actively Exploited Flash Player Zero-Day Vulnerability

Hackers Exploit Poorly Configured Clients to Steal Over $20 Million in Ethereum

Title: Surge in Ethereum Theft Linked to Insecurely Configured Nodes In recent months, cybersecurity researchers have raised significant alarms regarding a series of cyberattacks targeting Ethereum users, with criminals reportedly amassing over $20 million through the exploitation of inadequately secured Ethereum nodes. These breaches have centered around actively scrutinizing the…

Read MoreHackers Exploit Poorly Configured Clients to Steal Over $20 Million in Ethereum

ICE Inquires with Companies on ‘Ad Tech and Big Data’ Tools for Use in Investigations

U.S. Immigration and Customs Enforcement (ICE) has put out a call for information regarding “commercial Big Data and Ad Tech” solutions that can “directly support investigative activities.” This request, made public in the Federal Register, signals ICE’s interest in tools capable of managing and analyzing the increasing volumes of data…

Read MoreICE Inquires with Companies on ‘Ad Tech and Big Data’ Tools for Use in Investigations

Former CIA Employee Accused of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks

Major Leak Notification: Former CIA Programmer Charged in Historic Security Breach In a significant development within the realm of cybersecurity, Joshua Adam Schulte, a 29-year-old former CIA computer programmer, has been indicted in connection with what has been termed the largest leak of classified information in the agency’s history. Previously…

Read MoreFormer CIA Employee Accused of Leaking ‘Vault 7’ Hacking Tools to WikiLeaks