Hacking

OAuth apps used in cryptocurrency mining, phishing campaigns, and BEC attacks

Microsoft warns that threat actors are using OAuth applications cryptocurrency mining campaigns and phishing attacks. Threat actors are using OAuth…

2 years ago

Ukrainian military intelligence service hacked the Russian Federal Taxation Service

The Ukrainian government's military intelligence service announced the hack of the Russian Federal Taxation Service (FNS). Hackers of the Main…

2 years ago

Kyivstar, Ukraine’s largest mobile carrier brought down by a cyber attack

Kyivstar, the largest Ukraine service provider, was hit by a cyber attack that paralyzed its services. The attack is linked…

2 years ago

Operation Blacksmith: Lazarus exploits Log4j flaws to deploy DLang malware

North Korea-linked APT group Lazarus was spotted exploiting Log4j vulnerabilities to deploy previously undocumented remote access trojans. The North Korea-linked…

2 years ago

Toyota Financial Services discloses a data breach

Toyota Financial Services (TFS) disclosed a data breach, threat actors had access to sensitive personal and financial data. Toyota Financial…

2 years ago

Apache fixed Critical RCE flaw CVE-2023-50164 in Struts 2

The Apache Software Foundation addressed a critical remote code execution vulnerability in the Apache Struts 2 open-source framework. The Apache…

2 years ago

Researcher discovered a new lock screen bypass bug for Android 14 and 13

Researchers discovered a lock screen bypass bug in Android 14 and 13 that could expose sensitive data in users' Google…

2 years ago

Hacktivists hacked an Irish water utility and interrupted the water supply

Threat actors launched a cyberattack on an Irish water utility causing the interruption of the power supply for two days.…

2 years ago

5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips

A set of flaws, collectively called 5Ghoul, in the firmware implementation of 5G mobile network modems from major vendors impacts Android…

2 years ago

Bypassing major EDRs using Pool Party process injection techniques

Researchers devised a novel attack vector for process injection, dubbed Pool Party, that evades EDR solutions. Researchers from cybersecurity firm…

2 years ago

This website uses cookies.