Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer
By: Ravie Lakshmanan
Dutch authorities on Friday announced the arrest of a software developer in Amsterdam who is alleged to be working for Tornado Cash, days after the U.S. sanctioned...
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users
By: Ravie Lakshmanan
A pair of reports from cybersecurity firms SEKOIA and Trend Micro sheds light on a new campaign undertaken by a Chinese threat actor named Lucky Mouse that...
Researchers Warn of Ongoing Mass Exploitation of Zimbra RCE Vulnerability
By: Ravie Lakshmanan
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two flaws to its Known Exploited Vulnerabilities Catalog, citing evidence of active exploitation.
The two high-severity issues...
Cisco Confirms It’s Been Hacked by Yanluowang Ransomware Gang
By: Ravie Lakshmanan
Networking equipment major Cisco on Wednesday confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee's personal...
Conti Cybercrime Cartel Using ‘BazarCall’ Phishing Attacks as Initial Attack Vector
By: Ravie Lakshmanan
Three different offshoots of the notorious Conti cybercrime cartel have resorted to the technique of call-back phishing as an initial access vector to breach targeted networks.
"Three autonomous...
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
By: Ravie Lakshmanan
Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and work phones bearing similar characteristics...
The Business of Hackers-for-Hire Threat Actors
By: The Hacker News
Today's web has made hackers' tasks remarkably easy. For the most part, hackers don't even have to hide in the dark recesses of the web to...
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
By: Ravie Lakshmanan
Facebook parent company Meta disclosed that it took action against two espionage operations in South Asia that leveraged its social media platforms to distribute malware to potential...
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’
By: Ravie Lakshmanan
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal of commandeering compromised systems.
"It is...
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
By: Ravie Lakshmanan
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices.
If left unpatched, the issues could allow an...