Category cyber-attacks

Cybercriminals Can Breach Your Network Simply by Sending a Fax

Recent research has unveiled alarming vulnerabilities concerning fax machines that could be exploited by remote attackers using nothing more than a fax number. Check Point researchers have pinpointed two critical remote code execution (RCE) vulnerabilities embedded within the communication protocols of millions of fax machines worldwide. Contrary to the perception…

Read MoreCybercriminals Can Breach Your Network Simply by Sending a Fax

Mastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Researchers at the Acronis Threat Research Unit (TRU) have uncovered a troubling trend where hackers are exploiting current news headlines to target U.S. government entities. Eschewing complex exploits, these cybercriminals utilize a more straightforward method: leveraging public curiosity about current events. In a report by Ilia Dafchev and Subhajeet Singha,…

Read MoreMastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Ex-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

A former Microsoft network engineer, Raymond Odigie Uadiale, recently received an 18-month prison sentence for his role in a money laundering operation tied to the Reveton ransomware. Uadiale had pleaded guilty earlier this year, highlighting the ongoing issue of cybersecurity threats and the criminal exploitation of digital platforms. Reveton, a…

Read MoreEx-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

Email Phishers Find New Method to Evade Microsoft Office 365 Security Protections

Recent warnings from cybersecurity researchers have highlighted an emerging phishing attack targeting users of Microsoft Office 365, a comprehensive suite of online services including Exchange, SharePoint, and various Office applications. This sophisticated attack has been designed to subvert the Advanced Threat Protection (ATP) measures employed by major email services to…

Read MoreEmail Phishers Find New Method to Evade Microsoft Office 365 Security Protections

16-Year-Old Hacktivist Breaches Apple Servers and Pilfers 90GB of Confidential Data

Apple Security Breach Exposed by Teenage Hacker In a surprising turn of events, Apple, a company long regarded as a bastion of cybersecurity, fell victim to a breach orchestrated by a 16-year-old high school student. This incident has raised significant concerns within the tech community, especially among business owners wary…

Read More16-Year-Old Hacktivist Breaches Apple Servers and Pilfers 90GB of Confidential Data

GoFundMe Violates Its Own Policies by Hosting Legal Defense Fund for ICE Agent Involved in Renee Good’s Death

GoFundMe Campaign for ICE Officer’s Legal Defense Raises Concerns Over Policy Violation GoFundMe, a prominent crowdfunding platform, is maintaining a fundraising campaign aimed at covering the potential legal fees of an Immigration and Customs Enforcement (ICE) officer involved in a civilian’s fatal shooting. This decision has sparked debate, as the…

Read MoreGoFundMe Violates Its Own Policies by Hosting Legal Defense Fund for ICE Agent Involved in Renee Good’s Death

Microsoft Uncovers Increased Russian Cyber Attacks Before Mid-Term Elections

Microsoft Discovers New Russian Hacking Attempts Ahead of U.S. Midterm Elections In a recent revelation, Microsoft announced the discovery of new hacking efforts attributed to the Russian hacking group APT28, also known as Strontium or Fancy Bear. These attempts, aimed at conservative think tanks and the U.S. Senate, surfaced amid…

Read MoreMicrosoft Uncovers Increased Russian Cyber Attacks Before Mid-Term Elections