Allegedly Western nation-state actors breached the systems of Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. According to the Reuters, Western state-sponsored hackers breached the systems of the Russian tech giant Yandex in 2018, the attack involved a new variant of the Regin malware. The Regin malware has been […]
A long-running operation carried out by China-linked hackers, and tracked as Cloud Hopper, has targeted clients of major companies, including IBM, HPE, Tata CS, Fujitsu, and NTT. Hackers broke into the internal networks on major companies, such as HPE and IBM, and stole corporate data and trade secrets. Then the attackers used the stolen information […]
Hackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider, and accessed to email and file sharing systems for some of its clients. Hackers breached the infrastructure of PCM Inc., one of the major U.S.-based cloud solution provider. According to the popular investigator Brian Krebs, the attackers gained access to […]
Another cryptocurrency exchange announced to have suffered a theft, this time is the victim is the Singapore-based Bitrue. It has happened again, crooks stole funds from another cryptocurrency exchange, this time the victim is the Singapore-based Bitrue. Bitrue revealed on Thursday that hackers accessed the accounts of tens of its customers and stole their funds. […]
Multiple flaws in the BlueStacks Android emulator were addressed, including a vulnerability that allowed attackers to remotely control code execution. Other issues included information disclosure and a flaw that allowed attackers to steal backups of the VM and its data. In April, the researcher Nick Cano discovered that BlueStacks versions prior than v4.90.0.1046 are affected by a […]
Security expert Marco Ramilli analyzed similarities and differences between the MuddyWater and APT34 cyberespionage groups. Many state sponsored groups have been identified over time, many of them have different names (since discovered by different organizations) and there is no an agreed standardization on the topic but many victims and some interests look very tight together. […]
Experts discovered security flaws in EA Games’ login process that could allow an attacker to take over EA gamers’ accounts and steal sensitive data. Experts at Check Point Research and Cyberint discovered multiple security flaws in EA Games’ login process that could allow an attacker to take over EA gamers’ accounts and steal sensitive data. […]
European law enforcement agencies have arrested 6 individuals in connection with a €24 million ($27.2 million) cryptocurrency theft. An operation conducted by European law enforcement agencies resulted in the arrest of 6 individuals involved in a €24 million ($27.2 million) cryptocurrency theft. The group of cyber criminals is composed of five men and one woman, […]
Experts from security firm Netskope observed variants of LokiBot and NanoCore malware distributed in ISO Image through malspam campaign. Security firm Netskope observed a new malspam campaign delivering variants of LokiBot and NanoCore malware in ISO image file attachments. “Netskope Threat Research Labs has been tracking multiple similar malspam campaigns that began in April 2019. […]
Security experts warn of a new piece of the Silex malware that is bricking thousands of IoT devices, and the situation could rapidly go worse. Akamai researcher Larry Cashdollar discovered a new piece of the Silex malware that is bricking thousands of IoT devices, over 2,000 devices have been bricked in a few hours and the […]