fbpx

Richard Giddey

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware

Hackers exploit unpatched Ivanti vulnerabilities to deploy malware on Linux systems. Magnet Goblin targets businesses using outdated software. Patch immediately and implement strong security measures to protect against these attacks. Cybersecurity researchers at Check Point are warning of a malicious campaign targeting one-day vulnerabilities in Ivanti and other security software products, potentially impacting a wide […]

Magnet Goblin Hackers Using Ivanti Flaws to Deploy Linux Malware Read More »

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking

Consumer Reports exposes security vulnerabilities in popular video doorbells allowing unauthorized access, stolen footage, and privacy risks. Learn how to protect your home from insecure devices. The video doorbell market has been flooded with a wide variety of brands, devices, versions, and sellers, making it difficult for buyers to find safe and reliable products. To

Unsecured Video Doorbells Sold on Major Platforms: Millions at Risk of Hacking Read More »

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout

The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a bogus law enforcement seizure banner. “ALPHV/BlackCat did not get seized. They are exit scamming their affiliates,” security researcher Fabian Wosar said. “It is blatantly obvious when you check the source code of the

Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout Read More »

Mirror publisher Reach cuts sum set aside for phone-hacking payouts

Mirror publisher Reach cuts sum set aside for phone-hacking payouts

Reach, the publisher of the Mirror and Express newspapers, has cut the amount set aside to deal with legal claims relating to phone hacking and unlawful information-gathering by £20m as it seeks to draw a line under the scandal. The company, which owns scores of newspapers and websites across the UK including the Express, the

Mirror publisher Reach cuts sum set aside for phone-hacking payouts Read More »

American Express Cardholders Impacted by Third-Party Vendor Data Breach

American Express Cardholders Impacted by Third-Party Vendor Data Breach

American Express cardholders are advised to be vigilant after a data breach at a third-party vendor potentially exposed some card information. While American Express systems remain secure, the breach may have compromised card numbers, names, expiration dates, and other details. American Express notified card members today of a data breach impacting some customer information, emphasizing

American Express Cardholders Impacted by Third-Party Vendor Data Breach Read More »

Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework - Help Net Security

Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework – Help Net Security

Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Overcoming the pressures of cybersecurity startup leadership In this Help Net Security interview, Kunal Agarwal, CEO at Dope Security, offers a look into the CEO’s leadership

Week in review: LockBit leak site is back online, NIST updates its Cybersecurity Framework – Help Net Security Read More »

CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info

CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info

CutOut.Pro, an AI-powered platform specializing in image and video editing, faced a hacker’s claim of a data breach on February 27, 2024. An individual who identifies themselves as KryptonZambie has come forward, claiming that they have successfully breached CutOut.Pro, a Singapore-based platform known for its AI-powered tools catering to visual design and content creation, particularly

CutOut.Pro AI Tool Data Breach: Hacker Leak 20 Million User Info Read More »

Cybercriminals harness AI for new era of malware development - Help Net Security

Cybercriminals harness AI for new era of malware development – Help Net Security

Cybercriminals harness AI for new era of malware development The alliance between ransomware groups and initial access brokers (IABs) is still the powerful engine for cybercriminal industry, as evidenced by the 74% year-on-year increase in the number of companies that had their data uploaded on dedicated leak sites (DLS), according to Group-IB’s Hi-Tech Crime Trends

Cybercriminals harness AI for new era of malware development – Help Net Security Read More »

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown

The threat actors behind the LockBit ransomware operation have resurfaced on the dark web using new infrastructure, days after an international law enforcement exercise seized control of its servers. To that end, the notorious group has moved its data leak portal to a new .onion address on the TOR network, listing 12 new victims as

LockBit Ransomware Group Resurfaces After Law Enforcement Takedown Read More »

The Mysterious Case of the Missing Trump Trial Ransomware Leak

The Mysterious Case of the Missing Trump Trial Ransomware Leak

This week, the notorious ransomware gang known as LockBit threatened a kind of disruption that would have been a first even for a criminal industry that has crippled hospitals and triggered the shutdown of a gas pipeline: leaking documents from the criminal prosecution of a former president and presidential candidate. Then, without explanation, that threat

The Mysterious Case of the Missing Trump Trial Ransomware Leak Read More »

Scroll to Top