Items tagged with cybersecurity
by
Alan Velasco - Tue, May 28, 2024
Threat actors are actively trying to exploit VPN environments that make use of remote access at an accelerated rate, in order to infiltrate and attack enterprise networks, according to cyber security firm Check Point. The company says the...
Read more...
by
Nathan Ord - Mon, May 20, 2024
Are you looking to get some laundry done on the cheap or, even better yet, free? It turns out a security flaw in a popular internet-connected laundry machine vendor could allow anyone to avoid paying the fee for washing or drying clothes...
Read more...
by
Nathan Ord - Mon, May 13, 2024
It has been a little while since our last major data breach, with the latest being back on April Fools' with AT&T having the information of 73 million accounts appear on the dark web. However, hackers never rest so it was simply a matter...
Read more...
by
Nathan Ord - Tue, May 07, 2024
Artificial intelligence has been used for some rather interesting applications, such as helping people deal with losing a loved one. While this is a unique use of the technology, there is so much more that AI can be used to improve our...
Read more...
by
Nathan Ord - Sun, May 05, 2024
Earlier this month, Microsoft discovered a vulnerability pattern in Android applications that could enable overwriting files and allow remote code execution. This issue that could be leveraged by attackers has also been seen in the wild...
Read more...
by
Nathan Ord - Mon, Apr 22, 2024
In the past few years, the ransomware market has heated up, leading to more payouts for threat actors and more attacks overall. However, in late 2023, with the seizure of BlackCat ALPHV by law enforcement, among other factors, the business...
Read more...
by
Nathan Ord - Fri, Apr 19, 2024
If you are a threat actor and want to mine cryptocurrency or steal some juicy information, a gamer’s PC is a good target for that sort of thing, given the hardware and software they use. Even better yet is the PC of a game cheater because...
Read more...
by
Nathan Ord - Wed, Apr 10, 2024
End-of-life hardware can be quite the problem at times, even crashing back into Earth’s atmosphere at supersonic speeds for that matter. Of course, we wouldn’t expect such travesties happening with the hardware you keep in your basement...
Read more...
by
Nathan Ord - Sun, Mar 31, 2024
Over the past few days, the security world has been abuzz with the discovery of a backdoor snuck into a compression utility called xz-utils. While this backdoor was effectively a near miss, getting caught before it became pervasive, it...
Read more...
by
Nathan Ord - Sun, Mar 24, 2024
A team of researchers recently found a side-channel vulnerability in Apple’s custom SoC architecture that does not appear patchable and allows for the theft of encryption keys.
The research team, which hails from six different...
Read more...
by
Nathan Ord - Thu, Mar 21, 2024
Most experts would suggest that humans are the weakest link in cybersecurity, which is evidenced by the pervasiveness of phishing emails and whatnot. However, it’s not just end users that can be a problem. System administrators are human...
Read more...
by
Nathan Ord - Mon, Mar 18, 2024
Over the weekend, the hero shooter game Apex Legends, made by EA and Respawn Entertainment, held a tournament that was reportedly compromised by hackers. Multiple players' systems were breached, and game cheats such as X-ray vision and aimbots were installed. How exactly this happened is...
Read more...
by
Nathan Ord - Fri, Mar 15, 2024
StopCrypt ransomware is one of the most prolific yet underreported ransomware families due to its usual target of individuals rather than high-profile businesses or larger entities. We may not see this strain of ransomware in the United...
Read more...
by
Nathan Ord - Thu, Mar 14, 2024
This week, researchers have reported that earlier this year, threat actors leveraged a vulnerability in Windows to deploy DarkGate malware after phishing the victim for initial access. The vulnerability tracked as CVE-2024-21412 led to...
Read more...
by
Nathan Ord - Wed, Mar 13, 2024
Over the past few months, the infamous ransomware group LockBit has faced significant turmoil, including threatening a forum administrator with murder. All while this was happening, members of the group like Mikhail Vasiliev were sitting...
Read more...
by
Nathan Ord - Tue, Mar 12, 2024
Account credentials and personal data are hot commodities online, which often going up for sale at low prices so shady characters can move thousands of accounts quickly. This is reportedly what has happened to just over 15,000 Roku...
Read more...
by
Nathan Ord - Fri, Mar 08, 2024
Researchers have shown that running a man-in-the-middle attack against a Tesla owner can potentially compromise their account, unlock their car, and ultimately allow threat actors to drive away with it. There are, of coruse, a number a caveats. Much of this hinges on some social engineering...
Read more...
by
Nathan Ord - Thu, Mar 07, 2024
The Federal Bureau of Investigation’s Internet Crime Complaint Center (IC3) is the primary interface between the public and the U.S. government, to report cybercrime and collect information about cybersecurity threats. The IC3 recently...
Read more...
by
Nathan Ord - Wed, Mar 06, 2024
Following yesterday's report on an Air National Guard member sharing classified documents around the Internet, it seems the U.S. Government cannot catch a break. A 63-year-old civilian member of the U.S. Air Force assigned to U.S...
Read more...
by
Nathan Ord - Tue, Mar 05, 2024
Early in 2023, a Department of Defense leaker was nabbed after a year of posting sensitive documents to a Minecraft Discord server. Those documents made their way to sites like 4chan and elsewhere on the internet, and included a plethora...
Read more...
by
Nathan Ord - Mon, Mar 04, 2024
The criminal underbelly of cybersecurity is a shady place, with threat actors thieving data and information wherever possible. On the seemingly competent side of the business, some folks also wish to make a quick buck off the latest hype...
Read more...
by
Nathan Ord - Mon, Mar 04, 2024
The Flipper Zero, known for its use in widespread shenaniganry, is quite the little hacking device in all actuality. This pint-size hacking device is great for cloning hotel keys, opening garages (or Tesla charging ports), adjusting TVs...
Read more...