A 20-year-old college student that has stolen more than $5 million worth of cryptocurrency through SIM swapping attacks gets a 10 years jail sentence. Joel Ortiz, a young hacker (20) who stole more than $5 million worth of cryptocurrency by hijacking victims’ phone numbers has pleaded guilty for “SIM swapping” attacks. The college student accepted […]
Metro Bank has become the first major bank to disclose SS7 attacks against its customers, but experts believe it isn’t an isolated case. A new type of cyber attack was used for the first time against the Metro Bank, threat actors are leveraging known flaws in the SS7 signaling protocol to intercept the codes sent via […]
Researchers at the threat intel firm Recorded Future, have identified the hacker who amassed credentials in Collection #1 archive. Security experts at the threat intel firm Recorded Future, have discovered the hacker who allegedly created and offered for sale the massive collection known as Collection #1. The âCollection #1â archive was discovered by the cyber security […]
Managed security services or security operations, cloud security, GRC is one of the fastest growing solutions in the world. The only place I can say more risk = more gain would be in the entrepreneurship spaceâŠbecause in the enterprise cyber security kingdom, it is just the opposite! So let me explain⊠Before I start, stating […]
A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal 20% discount Kindle Edition Paper Copy Once again thank you! Using steganography to obfuscate PDF exploits Aztarna â […]
A sextortion scam campaign attempts to trick victims into believing that the adult site Xvideos.com was hacked and that crooks recorded its visitors. The creativity of cybercriminals is inexhaustible, a new variant of sextortion scam appeared in the threat landscape. A new sextortion scam campaign attempts to trick victims into believing that the popular adult […]
Hungarian police arrested a young hacker because he discovered and exploited serious vulnerabilities in the systems of the Magyar Telekom Which are the risks for a hacker that decide to publicly disclose a vulnerability? The case I’m going to discuss shows us legal implication for this conduct. Last year, Hungarian law enforcement arrested a young […]
Researchers at the CenturyLink Threat Research Labs discovered that the operators of the TheMoon IoT botnet are offering it as a service. Experts at the CenturyLink Threat Research Labs observed a new evolution for the TheMoon IoT botnet, operators added a previously undocumented module that allows them to offer it with a malware-as-a-service model. The […]
IBMâs security researchers demonstrated that the Siri Shortcuts introduced in the Apple iOS 12 can be abused by attackers. Apple implemented Siri Shortcuts in the iOS 12 to allow users to rapidly access to applications and features, they can automate common tasks and can be integrated by third-party developers in their software. Researchers at IBM […]
The home remodeling and design platform Houzz informed customers that it suffered a data breach that exposed some personal information. The popular home design platform Houzz has suffered a data breach that exposed some personal information. Houzz has over 40 million monthly unique users, at the time is not clear how many individuals are affected. […]