Content Paint

Vault 33: Cyber News - Intel - Research

Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.

News  | Nov 22, 2024
/
Microsoft rolls out Recall to Windows Insiders with Copilot+ PCs
Intel  | Nov 22, 2024
/
Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack'
News  | Nov 22, 2024
/
China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign
News  | Nov 22, 2024
/
APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware
News  | Nov 22, 2024
/
China's Cyber Offensives Built in Lockstep With Private Firms, Academia
Intel  | Nov 22, 2024
/
Malware Bypasses Microsoft Defender and 2FA to Steal $24K in Crypto

Read Our Latest Posts

Latest Posts

33 Posts
Russian Phobos ransomware operator faces cybercrime charges

Russian National Evgenii Ptitsyn Extradited Evgenii Ptitsyn, a Russian national accused of orchestrating the Phobos ransomware attacks, has been extradited from South Korea to the United States, where he is facing multiple cybercrime charges. Widespread Ransomware Operation The U.S. Department of Justice (DoJ) revealed that since November 2020, Ptitsyn

'Water Barghest' Sells Hijacked IoT Devices for Proxy Botnet Misuse

A notorious cybercriminal group known as "Water Barghest" has been exploiting vulnerabilities in Internet of Things (IoT) devices, profiting by listing these compromised devices on residential proxy marketplaces. This allows attackers, including state-sponsored advanced persistent threats (APTs), to leverage these devices as proxy botnets. Overview of Water Barghest&

New Ghost Tap attack abuses NFC mobile payments to steal money

Cybercriminals are leveraging a sophisticated attack method named "Ghost Tap" to exploit credit card details associated with mobile payment platforms such as Apple Pay and Google Pay. This method clandestinely transfers NFC-based card information to accomplices around the globe, enabling unauthorized transactions. Innovative Exploit: Ghost Tap represents an

Apple Issues Emergency Security Update for Actively Exploited Vulnerabilities

Apple has announced urgent security updates to fix two serious vulnerabilities actively exploited on its devices. These updates are available in iOS 18.1.1, iPadOS 18.1.1, Safari 18.1.1, visionOS 2.1.1, and macOS Sequoia 15.1.1, covering a wide array of Apple products,

China's 'Liminal Panda' APT Attacks Telcos, Steals Phone Data

In US Senate testimony, a CrowdStrike exec explained how this advanced persistent threat penetrated telcos in Asia and Africa, gathering SMS messages, unique identifiers, and other metadata along the way.

The Israeli Pager Attack: A Supply Chain Attack Case Study

Supply chain attacks have emerged as a significant threat in the cybersecurity landscape, with nation-states increasingly leveraging these tactics to infiltrate and disrupt target organizations. A notable example is the Israeli operation involving the sabotage of pagers used by Hezbollah operatives, highlighting the complexities and potential consequences of such strategies.

Browse by Tags

3 Tags
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.