Security

The IoT Nightmare - Attackers Can Compromise Apps, Steal Credentials

The IoT Nightmare – Attackers Can Compromise Apps, Steal Credentials

Barracuda Labs runs remote IoT attack via web and mobile apps, with no product contact Vulnerabilities allow for credential theft, access to sensitive information like camera feeds.  Over the past few years, the Internet...
VeryMal Malvertising Campaign Can Bypass Scanners on Mac OS

VeryMal Malvertising Campaign Can Bypass Scanners on Mac OS

A new malicious ad campaign has been discovered that is capable of triggering as many as 5 million times a day. The ad is hidden in JavaScript code and does not trigger...
ascension leak

Ascension Database Misconfiguration Exposes 24 Million Financial and Banking Documents

A huge banking database of sensitive information was left wide open for anyone to access. The information contained in the documents makes it a goldmine for cybercriminals. The situation with non-secure...
anatova ransomware

Anatova is One of the Most Sophisticated Ransomwares Ever

Anatova comes with multi-layered cipher key encryption that makes one-step decryption impossible. The ransomware is also wiping its traces and keys from the memory to prevent data dump and decryptor development. The...
threadx logo

Marvell Avastar Found To Contain Two Severe Vulnerabilities [Update]

Four memory corruption problems were found to plague many versions of the ThreadX firmware. One of them is especially easy to exploit, following standard escalation techniques. Fixing patches are in the...
MMORPG ATLAS Taken Down Twice Due to Players Using Server Exploits

ATLAS Taken Down Twice; Due to Players Using Server Exploits

Massively multiplayer online game ATLAS suffered two separate server exploits last week that disrupted gameplay. The first incident occurred on January 17 due to an admin’s Steam account being hacked. The...

AIESEC Data Breach Exposes Information of 4 Million Applicants

Four million internship applicants see their sensitive personal information fly off to unknown destinations. AIESEC responds by saying “this was our mistake, but only 40 applicants were actually exposed”. Budget allocation...
casino

Online Casino Gamblers Lose More Than Their Bets

Several online casinos that utilized a particular ElasticSearch database had their users' data open to access. The information that leaked includes real names, winnings, home addresses, and more. The mother company...
stop ransomware

STOP Ransomware Finds New Infection Channels Through Software Cracks

A new variant of the STOP ransomware is out on the hunt for victims, hitting new distribution highs. The infections find their way to the victims’ machines through popular software cracks. ...
Google Drive

DarkHydrus APT Group is Using Google Drive for Spreading ‘RogueRobin’ Trojan

According to 360 Threat Intelligence Center, the DarkHydrus Group is actively spreading the RogueRobin Trojan. The Windows Trojan is being released through Google Drive via Excel documents. DarkHydrus has been an active...

Most Popular