Home Blog Page 86
Recent research "Digital Shadows" lifts the cover on Initial Access Brokers (IABs), a fast-growing new class of cybercriminals who breach organizations, and then sell that access to other threat actors, enabling them to do their dirty work (exfiltrations, RATs,...
Credit scores of millions of Americans were exposed online after a third-party vendor misconfigured the Application Programming Interface (API) keys belonging to the credit reporting agency, Experian. As reported by Krebs on Security, independent security researcher Bill Demirkapi discovered...
If you own a Tesla car and see a drone hovering around your parking lot, be super aware! Someone might be trying to gain access to your car by hacking into it. Security researchers Ralf-Philipp Weinmann and Benedikt Schmotzle...
Security threats from mobile applications continue to be a major risk for developers and users. Cybercriminals often try to exploit vulnerabilities or misconfigurations in the cloud infrastructure of iOS and Android mobile applications, exposing users’ personal information and taking...
India has transformed into a mobile-first economy. The ease of accessibility and cheaper data make these a primary source of entertainment. Given the transition to remote working, people are well accustomed to new technologies and are discovering different ways...
State-sponsored actors from Iran have often been linked to various cyberespionage campaigns targeting organizations globally. In a recent development, security experts from Flashpoint recently discovered another state-sponsored ransomware operation from Iran active since July 2020. Flashpoint stated that Iran's Islamic Revolutionary...
Group-IB, in coordination with the United Nations International Computing Centre (UNICC), has taken down a massive fake websites campaign in which 134 fraudulent websites were observed to be impersonating the World Health Organization (WHO) with an intent of duping people....
The infamous Babuk ransomware group has announced that it is shutting down its operation. The group allegedly posted the blackout message on its data leak site, which was later taken down. The Russian-speaking gang has been very active since...
The effort to produce this information resource results from a collaborative effort between the Bergen County Technical Schools (high school), through the advisor Andrea Buccino, and a cybersecurity expert mentor. High school senior members of this learning partnership are...
When I was a kid, I watched a lot of terrible action movies. Maybe it was just growing up in the 1980s, and there were a lot of bad ones to watch. My dad was a Green Beret, and...