cyber security
-
Google sued for tracking users in incognito mode, agrees to pay $5 billion settlement
Google agreed to pay $5 billion to settle a privacy lawsuit alleging that the company tracked users in incognito mode. The lawsuit accused Google of using tools such as Google Analytics to collect data on users even when they thought they were browsing privately.
-
Orbit Bridge Cryptocurrency Losses Up to $82 Million in Hacking Attacks
On New Year's Eve 2024, Orbit Bridge was hit by a massive hack that cost over $82 million. The incident sparked panic in the crypto community and highlighted once again the importance of cryptocurrency security.
-
Iran's cyber espionage "muddy waters" are back, and the Middle East telecommunications industry has become a new hunting ground
The Iranian state-level cyber espionage organization "MuddyWater" has resurfaced and used a new command and control framework called "MuddyC2Go" to launch attacks targeting the telecommunications industries of Egypt, Sudan and Tanzania. Symantec Threat Hunter Team…
-
The Russian Matrix: Revealing the Operations of Wazawaka and its Cyber Extortion Gang
Cybersecurity researchers have revealed the inner workings of a ransomware operation led by Mikhail Pavlovich Matveev, a Russian citizen who was indicted by the U.S. government earlier this year on charges that he engaged in...
-
Crypto wallet Ledger supply chain vulnerability led to the theft of $600,000 in virtual assets
A supply chain attack on crypto hardware wallet manufacturer Ledger resulted in the theft of $600,000 in crypto assets. The attacker obtained Ledger's npm account through a phishing attack on a resigned employee, and uploaded a malicious version of the Connect Kit module. These malicious versions spread cryptocurrency-stealing malware to other applications that rely on the module, creating software supply chain vulnerabilities.
-
North Korean hacker group Lazarus Group launches new cyber attack operation
Recently, a global attack campaign launched by the notorious North Korea-linked cyber threat group "Lazarus Group" was disclosed. This operation was named "Operation Blacksmith" and was characterized by exploiting the Log4j vulnerability (CVE-2021-44228, also known as Log4Shell) to deploy a previously unknown remote access Trojan (RAT) on target systems.
-
The rise of ransomware as a service (RaaS) users face more severe threats
In the evolving world of cybersecurity, ransomware attacks have become a serious and widespread threat. Among the different forms of ransomware, a trend called Ransomware-as-a-Service (RaaS) is becoming increasingly prominent. This worrying development changes the cybercrime landscape, enabling individuals with limited technical capabilities to carry out destructive attacks.
-
WordPress 6.4.2 releases update to address high-risk remote code execution vulnerability
WordPress has released version 6.4.2, which contains a patch for a critical security vulnerability that could be exploited by threat actors to combine it with another vulnerability to execute arbitrary PHP code on vulnerable websites.
-
Data security: How does generative AI deal with security risks and challenges?
The development and application of AI are having a major impact on the scientific and technological field and may trigger a new productivity revolution. As a powerful technology, AI gives computer systems the ability to generate human language content.
-
Apache Ofbiz xml-RPC remote code execution vulnerability (CVE-2023-49070)
Apache OFBiz is an open source product for enterprise process automation. It includes framework components and business applications for ERP, CRM, e-commerce, supply chain management and manufacturing resource planning. There is a remote code execution vulnerability in Apache OFBiz before version 18.12.10. Because xml-RPC is no longer maintained, an authenticated attacker can use xml-RPC to conduct remote code execution exploits and control the server.