Twitter data breach: Hacker put 200M users’ private information up for grabs
200 million Twitter users’ private information, including their email addresses, was put for sale after a breach exposed 400 million users’ private information in the last week of December...
Nifty News: Solana NFT trading volume, Nike RTFKT COO hacked and more
DNP3, a streamer and founder of several crypto projects like The charity-focused crypto CluCoin, The Goobers nonfungible token (NFT) and the metaverse platform Gridcraft Network has admitted to losing...
Hackers steal $3.5M worth of digital assets from GMX whale
Hackers have started the year with another exploit, with several million being taken from a whale holding large amounts of decentralized finance (DeFi) protocol GMX’s native token. On Jan. 3,...
Cyberattackers Torch Python Machine Learning Project
An unknown attacker slipped a malicious binary into the PyTorch machine learning project by registering a malicious project with the Python Package Index (PyPI), infecting users' machines if they...
How To Prevent the IaC Misconfiguration Snowball Effect
The goal with infrastructure as code (IaC) frameworks such as Terraform and CloudFormation is to make infrastructure provisioning more efficient. Through a combination of automation and either imperative or...
Chinese ‘RedZei’ Group Batters Victims With Incessant Vishing Effort
Chinese threat actors have been targeting Chinese-speaking students in the United Kingdom with a unique phone scam that aims to steal their personal information with repeated phone calls and...
Raspberry Robin Worm Hatches a Highly Complex Upgrade
Hacking groups are using a new version of the Raspberry Robin framework to attack Spanish and Portuguese-language based financial institutions — and it's complexity quotient has been significantly upgraded,...
Holiday Spirit? LockBit Gives Children’s Hospital Free Decryptor
After being hit by the LockBit ransomware-as-a-service (RaaS) apparatus, the Hospital for Sick Children (SickKids) received an unexpected holiday gift: A free decryptor and an apology from the cybercriminal...
PyTorch suffers supply chain attack via dependency confusion
Users who deployed the nightly builds of PyTorch between Christmas and New Year's Eve likely received a rogue package as part of the installation that siphoned off sensitive data...
No ‘respite’ for exploits, flash loans or exit scams in 2023: Cybersecurity firm
The new year is a fresh start for malicious actors in the crypto space and 2023 won’t likely see a slowdown in scams, exploits and hacks, according to CertiK.The...