T-Mobile hacker gets 10 years for $25 million phone unlock scheme
Argishti Khudaverdyan, the former owner of a T-Mobile retail store, was sentenced to 10 years in prison for a $25...
Argishti Khudaverdyan, the former owner of a T-Mobile retail store, was sentenced to 10 years in prison for a $25...
Restaurant customer management platform SevenRooms has confirmed it suffered a data breach after a threat actor began selling stolen data on...
To evade detection by security software, malware developers and threat actors increasingly use compromised code-signing certificates to sign their malware....
This blog entry discusses the technical details of how we exploited CVE-2022-22583 using a different method. We also tackle the...
We look into some of the implementations that cybercriminals use to bypass the Windows Antimalware Scan Interface (AMSI) and how...
From September to December, we detected multiple attacks from the Royal ransomware group. In this blog entry, we discuss findings...
American identity and access management giant Okta revealed that that its private GitHub repositories were hacked this month.Okta revealed that its private GitHub repositories...
CyberNews researchers reported that Ecco, a global shoe manufacturer and retailer, exposed millions of documents. Original post @ https://cybernews.com/security/ecco-leaks-sensitive-data-for-months/Ecco, a...
IT giant Cisco is warning of threat actors exploiting many old vulnerabilities in attacks in the wild.Cisco has updated multiple...
US government is warning of business email compromise (BEC) attacks aimed at hijacking shipments of food products and ingredients.The Federal...
Microsoft disclosed technical details of a vulnerability in Apple macOS that could be exploited by an attacker to bypass Gatekeeper.Microsoft...
Researchers spotted a new variant of the Agenda ransomware which is written in the cross-platform programming language Rust. Trend Micro...
Ukraine’s CERT-UA revealed the national Delta military intelligence program has been targeted with a malware-based attack.On December 17, 2022, the...
The Glupteba botnet is back, researchers reported a surge in infection worldwide after Google disrupted its operation in 2021.In December...
German multinational industrial engineering and steel production company ThyssenKrupp AG was the target of a cyberattack.German multinational industrial engineering and...
Researchers spotted a malicious package in the Python Package Index (PyPI) repository that impersonates a software development kit (SDK) for...
US government is warning of business email compromise (BEC) attacks aimed at hijacking shipments of food products and ingredients.The Federal...
IT giant Cisco is warning of threat actors exploiting many old vulnerabilities in attacks in the wild.Cisco has updated multiple...
Russia-linked Gamaredon APT group targeted a large petroleum refining company in a NATO state this year amid the invasion of...
More than two years ago, a researcher, A2nkF demonstrated the exploit chain from root privilege escalation to SIP-Bypass up to...
We found samples of the Raspberry Robin malware spreading in telecommunications and government office systems beginning September. The main payload...
We discuss the use of the InterPlanetary File System (IPFS) in phishing attacks. If you like the site, please consider...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Microsoft announced that a botnet dubbed MCCrash is launching distributed denial-of-service (DDoS) attacks against private Minecraft servers. Microsoft spotted a...