hacking news

Glowworm Attack allows sound recovery via a device’s power indicator LED

The Glowworm attack leverages optical emanations from a device's power indicator LED to recover sounds from connected peripherals and spy…

4 years ago
Four years after its takedown, AlphaBay marketplace revampedFour years after its takedown, AlphaBay marketplace revamped

Four years after its takedown, AlphaBay marketplace revamped

The popular black marketplace AlphaBay is back, four years after law enforcement agencies took down the popular hidden service. The darknet marketplace…

4 years ago
Classified documents from Lithuanian Ministry of Foreign Affairs are available for saleClassified documents from Lithuanian Ministry of Foreign Affairs are available for sale

Classified documents from Lithuanian Ministry of Foreign Affairs are available for sale

Emails allegedly stolen from the Lithuanian Ministry of Foreign Affairs are available for sale in a cybercrime forum, some emails…

4 years ago
Dumping user’s Microsoft Azure credentials in plaintext from Windows 365Dumping user’s Microsoft Azure credentials in plaintext from Windows 365

Dumping user’s Microsoft Azure credentials in plaintext from Windows 365

A security expert devised a method to retrieve a user's Microsoft Azure credentials in plaintext from Microsoft's new Windows 365…

4 years ago
SynAck ransomware gang releases master decryption keys for old victimsSynAck ransomware gang releases master decryption keys for old victims

SynAck ransomware gang releases master decryption keys for old victims

The SynAck ransomware gang released the master decryption keys for their operations and rebranded as a new group dubbed El_Cometa…

4 years ago
Vice Society ransomware also exploits PrintNightmare flaws in its attackVice Society ransomware also exploits PrintNightmare flaws in its attack

Vice Society ransomware also exploits PrintNightmare flaws in its attack

Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice…

4 years ago
Google open-sourced Allstar tool to secure GitHub repositoriesGoogle open-sourced Allstar tool to secure GitHub repositories

Google open-sourced Allstar tool to secure GitHub repositories

Google has open-sourced the Allstar tool that can be used to secure GitHub projects and prevent security misconfigurations. Google has open-sourced the Allstar tool…

4 years ago
Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 usersMicrosoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users

Microsoft warns of a evasive year-long spear-phishing campaign targeting Office 365 users

Microsoft warns of a long-running spear-phishing campaign that has targeted Office 365 customers in multiple attacks since July 2020. Microsoft…

4 years ago
Trend Micro warns customers of zero-day attacks against its productsTrend Micro warns customers of zero-day attacks against its products

Trend Micro warns customers of zero-day attacks against its products

Security firms Trend Micro is warning its customers of attacks exploiting zero-day vulnerabilities in its Apex One and Apex One…

4 years ago
Magniber Ransomware operators use PrintNightmare exploits to infect Windows serversMagniber Ransomware operators use PrintNightmare exploits to infect Windows servers

Magniber Ransomware operators use PrintNightmare exploits to infect Windows servers

Threat actors behind the Magniber Ransomware are using PrintNightmare exploits in attacks aimed at Windows servers. Threat actors behind the…

4 years ago