News
A sophisticated phishing-as-a-service platform named Rockstar 2FA has recently surfaced, designed to conduct extensive adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials. Rockstar 2FA, a newly identified PhaaS platform, enables cybercriminals to execute large-scale phishing operations. This service is specifically engineered to exploit two-factor authentication (2FA) by intercepting and capturing sensitive
Mikhail Pavlovich Matveev, a Russian national known by aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, has been apprehended in Russia for his alleged connections to several notorious hacking groups. Matveev is accused of developing ransomware aimed at encrypting data from commercial entities to demand a ransom for decryption. Arrest
In a recent security development, U.S. telecom giant T-Mobile discovered efforts by cybercriminals to breach its network. However, the company assured that no sensitive information was accessed during these attempts. According to Jeff Simon, T-Mobile's Chief Security Officer, the intrusions were traced back to a wireline provider&
A U.S. citizen originally from China has been sentenced to four years in prison following his admission to spying on behalf of China's Ministry of State Security. Ping Li, 59, residing in Wesley Chapel, Florida, engaged in espionage by transferring confidential information from his employers to Chinese
Experts have uncovered significant security vulnerabilities in Advantech EKI industrial wireless access points, potentially allowing attackers to bypass authentication and execute remote code at elevated privilege levels. Overview of Vulnerabilities According to Nozomi Networks' latest analysis, these flaws present critical threats, enabling unauthenticated remote code execution with root permissions,
In a decisive move to bolster privacy and resist governmental censorship, the Tor Project is reaching out to its supporters to deploy 200 additional WebTunnel bridges by year-end. The Tor Project is recognized for its pivotal role in promoting online privacy through its anonymous browsing tools. This current appeal underscores
Cloudflare, a leader in internet security, reported a significant glitch in its logging system that resulted in the loss of 55% of customer logs for a 3.5-hour duration. The issue stemmed from a bug in the log collection service, disrupting the delivery of event logs to users. Cloudflare'
In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the
An extensive law enforcement effort has successfully dismantled a major pirate streaming service that operated globally, amassing over €250 million (approximately $263 million) in monthly revenue. This illicit service reached more than 22 million users across the world before it was brought down. Operation Scope The coordinated action involved multiple