Expert Luca Bongiorni was looking for new targets to test WHID Elite’s Radio Hacking capabilities and found an interesting one: Electrocuting Cock Ring Last week I was looking for new targets to test WHID Elite’s Radio Hacking capabilities and suddenly I found an interesting one: an Electrocuting Cock Ring. Yes, you read it correctly (What you cannot find […]
Data belonging to more than one million payment cards from South Korea surfaced in the dark web over the past two months. Experts noticed a spike in the number of stolen payment card details belonging to users from South Korea over the past two months. Card details from over one million payments cards from South […]
Group-IB discovered massive fraudulent campaigns carried out by Lotsy group involving the use of dozens of well-known brands aimed at Italian and Spanish-speaking customers. Group-IB, an international company that specializes in preventing cyberattacks, which has recently opened Global HQ in Singapore, has discovered a new wave of massive fraudulent campaigns involving the use of dozens […]
Facebook announced it dismantled covert influence campaigns in some countries in the Middle East and Northern Africa, including one tied to the Saudi government. Facebook uncovered two separate influence campaigns, one originated in the United Arab Emirates and Egypt, and another in Saudi Arabia. The campaigns appeared to be distinct and involved “coordinated inauthentic behavior” […]
Cyber Defense Magazine August 2019 Edition has arrived. We hope you enjoy this month’s edition…packed with over 205 pages of excellent content. Our Growing Media Platforms… www.cyberdefenseawards.comwww.cyberdefensemagazine.comwww.cyberdefenseradio.comwww.cyberdefensetv.com After 7 Years, We’ve Completely RebuiltCyberDefenseMagazine.com – Please Let Us Know What You Think. It’s mobile and tablet friendly and superfast. We hope you like it. In addition, we’re […]
Security researchers at Dragos Inc have tracked the activity of a threat actor recently discovered and dubbed Hexane. Security experts at Dragos Inc. have discovered a new threat actor, tracked as Hexane, that is targeting organizations in the oil and gas industry and telecommunication providers. The Hexane group has been active since at least the […]
Researchers at Trend Micro have discovered a new Mirai Botnet that has command and control server in the Tor network to make takedowns hard. Experts at Trend Micro have discovered a new Mirai Botnet that uses a Command and Control hidden in the Tor Network, a choice that protects the anonymity of the operators and […]
MICROCHIPS Act (S. 2316) – Two US Senators have introduced a bill to protect US government supply chain against foreign sabotage and cyber espionage. Two US senators have introduced legislation a bill, dubbed Manufacturing, Investment and Controls Review for Computer Hardware, Intellectual Property and Supply ACT (MICROCHIPS Act – S. 2316) that aims at protecting […]
Cisco is going to pay $8.6 million to settle a legal dispute for selling vulnerable software to the US government. Back in 2008, a whistle-blower identifies a vulnerability in Cisco video surveillance software, but the tech giant continued to sell the software to US agencies until July 2013. The case was filed in the Federal […]
The U.S. CISA published a security advisory to warn of multiple critical vulnerabilities affecting in Prima FlexAir access control system. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) published an advisory to warn of critical flaws affecting access control systems manufactured by Prima Systems. Prima access control has a wide range of solutions, including wall-mounted […]