Month: July 2022

Hackers Are Stealing Bandwidth For Proxy Services Via Microsoft SQL Servers

Hackers Are Stealing Bandwidth For Proxy Services Via Microsoft SQL Servers

Posted on July 31, 2022 at 9:15 PM Security researchers have discovered a hacking activity where threat actors are hacking Microsoft SQL servers to steal bandwidth for proxy services. The hackers are converting the devices to proxies that are rented...

/ July 31, 2022
CISA Says Hackers Are Exploiting Known Confluence Vulnerability

CISA Says Hackers Are Exploiting Known Confluence Vulnerability

Posted on July 31, 2022 at 9:12 PM The U.S. Cybersecurity and Infrastructure Agency (CISA) has added a critical vulnerability to its catalog based on evidence of active exploitation. According to the agency, the vulnerability, tracked as CVE-2022-26138, is linked...

/ July 31, 2022
Stop Putting Your Accounts At Risk, and Start Using a Password Manager

Stop Putting Your Accounts At Risk, and Start Using a Password Manager

Image via Keeper Right Now, Get 50% Off Keeper, the Most Trusted Name in Password Management. In one way or another, almost every aspect of our lives is online, so it’s no surprise that hackers target everything from email accounts...

/ July 31, 2022
Alleged ShinyHunters Hacker Group Member Arrested

Alleged ShinyHunters Hacker Group Member Arrested

Sebastian Raoult (Le Français Sébastien Raoult), aka Sezyo, was arrested on June 1st, 2022 from the Rabat international airport and is believed to be one of the alleged members of the infamous ShinyHunters group. A French student has been detained...

/ July 30, 2022
How To Select Your Pentest Vendor: Guide

How To Select Your Pentest Vendor: Guide

Systematic Penetration Testing is the only way to be a step ahead of hackers, so it is worth spending money on. But there are thousands of companies offering penetration tests. You need to decide what exactly you want from the...

/ July 30, 2022
911 (911.re) Proxy Service Shuts Down After Confirming Security Breach

911 (911.re) Proxy Service Shuts Down After Confirming Security Breach

At the time of writing, the home page of 911 (911.re) Proxy Service was displaying a detailed message left by the website’s administrator revealing details of the security breach. 911 proxy service (911.re), regarded as one of the few original...

/ July 30, 2022
Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers

Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers

Microsoft on Friday disclosed a potential connection between the Raspberry Robin USB-based worm and an infamous Russian cybercrime group tracked as Evil Corp. The tech giant said it observed the FakeUpdates (aka SocGholish) malware being delivered via existing Raspberry Robin...

/ July 30, 2022
Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online

Is this website Safe : How to Check Website Safety to Avoid Cyber Threats Online

is this website safe ? In this digital world, Check website safety is most important concern since there are countless malicious websites available everywhere over the Internet, it is very difficult to find a trustworthy website. We need to browse smart and...

/ July 30, 2022
PayPal's Third LHE Brings Top Global Hackers to the Virtual Stage

PayPal’s Third LHE Brings Top Global Hackers to the Virtual Stage

PayPal has been partnering with the hacker community since launching a bug bounty program in 2012 and in April 2022, they returned for their third live hacking event. As usual, PayPal showed up ready to engage the best of the...

/ July 29, 2022
Attackers Targeting MS-SQL Servers to Steal Bandwidth for Proxy Services

Attackers Targeting MS-SQL Servers to Steal Bandwidth for Proxy Services

A number of factors have emerged over the past few years that have allowed the attackers to generate handsome revenue, including the following:- Here, the cybersecurity researchers at Ahnlab have claimed that the compromised devices are converted into proxies, which...

/ July 29, 2022
Dahua IP Camera Vulnerability Could Let Attackers Take Full Control Over Devices

Dahua IP Camera Vulnerability Could Let Attackers Take Full Control Over Devices

Details have been shared about a security vulnerability in Dahua’s Open Network Video Interface Forum (ONVIF) standard implementation, which, when exploited, can lead to seizing control of IP cameras. Tracked as CVE-2022-30563 (CVSS score: 7.4), the “vulnerability could be abused...

/ July 29, 2022
Telegram and Discord Bots Delivering Infostealing Malware

Telegram and Discord Bots Delivering Infostealing Malware

Intel471 researchers have warned users about how cybercriminals are converting popular apps against them. A new report from security vendor Intel471 reveals how cybercriminals are using bots already deployed in messaging apps Discord and Telegram to deliver malware and steal...

/ July 28, 2022