Russian APT28 Hackers Exploit US Company Wi-Fi from Afar In a remarkable demonstration of their capabilities, Russian cyber espionage group APT28, also known as Fancy Bear and linked to Russia's military intelligence agency GRU, successfully infiltrated a U.S. company's Wi-Fi network from a distant location.
Vault 33: Cyber News - Intel - Research
Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.
Read Our Latest Posts
Latest Posts
Russian National Evgenii Ptitsyn Extradited Evgenii Ptitsyn, a Russian national accused of orchestrating the Phobos ransomware attacks, has been extradited from South Korea to the United States, where he is facing multiple cybercrime charges. Widespread Ransomware Operation The U.S. Department of Justice (DoJ) revealed that since November 2020, Ptitsyn
A notorious cybercriminal group known as "Water Barghest" has been exploiting vulnerabilities in Internet of Things (IoT) devices, profiting by listing these compromised devices on residential proxy marketplaces. This allows attackers, including state-sponsored advanced persistent threats (APTs), to leverage these devices as proxy botnets. Overview of Water Barghest&
Cybercriminals are leveraging a sophisticated attack method named "Ghost Tap" to exploit credit card details associated with mobile payment platforms such as Apple Pay and Google Pay. This method clandestinely transfers NFC-based card information to accomplices around the globe, enabling unauthorized transactions. Innovative Exploit: Ghost Tap represents an
Apple has announced urgent security updates to fix two serious vulnerabilities actively exploited on its devices. These updates are available in iOS 18.1.1, iPadOS 18.1.1, Safari 18.1.1, visionOS 2.1.1, and macOS Sequoia 15.1.1, covering a wide array of Apple products,
In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the way.
Supply chain attacks have emerged as a significant threat in the cybersecurity landscape, with nation-states increasingly leveraging these tactics to infiltrate and disrupt target organizations. A notable example is the Israeli operation involving the sabotage of pagers used by Hezbollah operatives, highlighting the complexities and potential consequences of such strategies.