Content Paint

Author Info

Full Name

Robert Skinner

Location

Austin, TX

Robert Skinner's Work

33 Posts
Robert Skinner
Russian Phobos ransomware operator faces cybercrime charges

Russian National Evgenii Ptitsyn Extradited Evgenii Ptitsyn, a Russian national accused of orchestrating the Phobos ransomware attacks, has been extradited from South Korea to the United States, where he is facing multiple cybercrime charges. Widespread Ransomware Operation The U.S. Department of Justice (DoJ) revealed that since November 2020, Ptitsyn

'Water Barghest' Sells Hijacked IoT Devices for Proxy Botnet Misuse

A notorious cybercriminal group known as "Water Barghest" has been exploiting vulnerabilities in Internet of Things (IoT) devices, profiting by listing these compromised devices on residential proxy marketplaces. This allows attackers, including state-sponsored advanced persistent threats (APTs), to leverage these devices as proxy botnets. Overview of Water Barghest&

New Ghost Tap attack abuses NFC mobile payments to steal money

Cybercriminals are leveraging a sophisticated attack method named "Ghost Tap" to exploit credit card details associated with mobile payment platforms such as Apple Pay and Google Pay. This method clandestinely transfers NFC-based card information to accomplices around the globe, enabling unauthorized transactions. Innovative Exploit: Ghost Tap represents an

Apple Issues Emergency Security Update for Actively Exploited Vulnerabilities

Apple has announced urgent security updates to fix two serious vulnerabilities actively exploited on its devices. These updates are available in iOS 18.1.1, iPadOS 18.1.1, Safari 18.1.1, visionOS 2.1.1, and macOS Sequoia 15.1.1, covering a wide array of Apple products,

China's 'Liminal Panda' APT Attacks Telcos, Steals Phone Data

In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the way.

The Israeli Pager Attack: A Supply Chain Attack Case Study

Supply chain attacks have emerged as a significant threat in the cybersecurity landscape, with nation-states increasingly leveraging these tactics to infiltrate and disrupt target organizations. A notable example is the Israeli operation involving the sabotage of pagers used by Hezbollah operatives, highlighting the complexities and potential consequences of such strategies.

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.