Home News Page 2

News

News from the cyber security world and abroad. Enjoy current affairs of the cyber underground and more. Browse popular news articles covering hackers and cybercrimnals alike. Discover new vulnerabilities and emerging threats that we cover. Looking for Malware or data breach related articles? Than the cyber post has all the cybersecurity information you can take in!

In addition to current affairs, we like to educate our readers. For instance, we have a learning section. Head over to our educational section and enjoy. Read some great tips and articles for securing your accounts and data. Protect yourself from phishing and basic password vulnerabilities. Looking for something more exciting to read? Than maybe some darknet stories will tickle your fancy. But sit back and enjoy exciting cybercrime stories from the darkweb. Learn of arrests and the data that carders and fraudsters peddle in.

MobiFriends Dating App Breached – 3.5 Million Credentials Leaked

0
The messages, hashed passwords and usernames of 3.5 million clients of the dating application MobiFriends were posted and available to be purchased on an underground discussion. The accreditations of 3.5...

Vulnerabilities in old GTP protocol could affect 4G and 5G networks

0
Experts cautioned that problems in the GPRS Tunneling Protocol (GTP) could affect the operation of 4G and 5G networks. In reports published  last week  and in  December 2019, Positive Technologies and A10 Networks described...

Amazon Stops Largest DDoS Ever Recorded By Their Systems

0
Amazon says it mitigated the largest DDoS attack ever recorded By @JonPorty  Jun 18, 2020, 7:31am EDT An attack with a previously unseen volume of 2.3 Tbps Amazon Web Services recently had to defend...

WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance

0
The AES-GCM-256 key is stored and generated by WhatsApp server and is sent to the client. When a user signs in to new device, it retrieves the key from the server...

WastedLocker Ransomware Using Hacked Websites to Spread via Fake Software Updates

0
Dozens of US news sites hacked in WastedLocker ransomware attacks By Sergiu Gatlan Image: C Drying The Evil Corp gang hacked into dozens of US newspaper websites owned by the same company to infect...

Hacking Group CryptoCore Has Stolen Over 200 Million From Cryptocurrency Exchanges

0
Researchers from the Israeli company ClearSky  talked about the hacker group CryptoCore , active since 2018 and specializing in hacking cryptocurrency exchanges. According to experts, the group is based somewhere in Eastern...

Google is indexing the phone numbers of WhatsApp Users

0
A researcher is warning that Google is indexing the phone numbers of WhatsApp users raising serious privacy concerns. Google is indexing the phone numbers of WhatsApp users that could be...

Lost in Translation

0
Translation makes it possible to exchange information across the globe, regardless of language differences. Translation plays a similar role in industrial internet of things (IIoT) environments where different devices,...

StrandHogg 2.0 – Android Flaw Leaves 1 Billion Devices Vulnerable to Application Hijacking

0
A security vulnerability affecting Android that malicious apps can exploit to masquerade as any other app installed on a targeted device to display fake interfaces to the users, tricking them into...

Commodified Cybercrime Infrastructure: Exploring the Underground Services Market for Cybercriminals

0
Cybercriminal takeover The server takeover is the earliest stage, where exposed assets are enumerated (i.e., via network scanners), accessed, and categorized by features (e.g., availability, bandwidth, and type of GPU)...
Error decoding the Instagram API json