Content Paint

News

Rockstar 2FA phishing service targets Microsoft 365 accounts in new attacks

A sophisticated phishing-as-a-service platform named Rockstar 2FA has recently surfaced, designed to conduct extensive adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials. Rockstar 2FA, a newly identified PhaaS platform, enables cybercriminals to execute large-scale phishing operations. This service is specifically engineered to exploit two-factor authentication (2FA) by intercepting and capturing sensitive

Russia arrests cybercriminal Wazawaka for ties with ransomware gangs

Mikhail Pavlovich Matveev, a Russian national known by aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, has been apprehended in Russia for his alleged connections to several notorious hacking groups. Matveev is accused of developing ransomware aimed at encrypting data from commercial entities to demand a ransom for decryption. Arrest

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

In a recent security development, U.S. telecom giant T-Mobile discovered efforts by cybercriminals to breach its network. However, the company assured that no sensitive information was accessed during these attempts. According to Jeff Simon, T-Mobile's Chief Security Officer, the intrusions were traced back to a wireline provider&

U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency

A U.S. citizen originally from China has been sentenced to four years in prison following his admission to spying on behalf of China's Ministry of State Security. Ping Li, 59, residing in Wesley Chapel, Florida, engaged in espionage by transferring confidential information from his employers to Chinese

More than Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP

Experts have uncovered significant security vulnerabilities in Advantech EKI industrial wireless access points, potentially allowing attackers to bypass authentication and execute remote code at elevated privilege levels. Overview of Vulnerabilities According to Nozomi Networks' latest analysis, these flaws present critical threats, enabling unauthenticated remote code execution with root permissions,

Tor needs 200 new WebTunnel bridges to fight censorship

In a decisive move to bolster privacy and resist governmental censorship, the Tor Project is reaching out to its supporters to deploy 200 additional WebTunnel bridges by year-end. The Tor Project is recognized for its pivotal role in promoting online privacy through its anonymous browsing tools. This current appeal underscores

Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours

Cloudflare, a leader in internet security, reported a significant glitch in its logging system that resulted in the loss of 55% of customer logs for a 3.5-hour duration. The issue stemmed from a bug in the log collection service, disrupting the delivery of event logs to users. Cloudflare'

Researchers Have Discovered a new UEFI Bootkit Malware for Linux

In a groundbreaking discovery, researchers have identified "the first UEFI bootkit specifically engineered to target Linux systems". This represents a significant evolution in bootkit threats, which have historically concentrated on Windows environments. Innovative Threat The UEFI bootkit is a sophisticated form of malware designed to integrate into the

Police Bust of Pirate Streaming Service Making Over €250 Million Per Month

An extensive law enforcement effort has successfully dismantled a major pirate streaming service that operated globally, amassing over €250 million (approximately $263 million) in monthly revenue. This illicit service reached more than 22 million users across the world before it was brought down. Operation Scope The coordinated action involved multiple

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.