Category: Technobabble

Improvements to boost the attack surface view, ports & more
TL/DR: Users now get additional insights on what is discovered on the attack surface. This includes information such as when an asset was last seen and to what extent an asset is exposed online, and much more. The attack surface...

Trezor Phishing Attack Victims Seek Compensation From Intuit
Posted on April 25, 2022 at 7:29 PM Financial software firm Intuit Inc is facing a class-action lawsuit over the recent phishing attack on Trezor wallets. The lawsuit was filed by victims of the cryptocurrency heist, with a man from...

Use of Zip and Unzip command in Linux
Zip is a file format that helps to compress one or more files together into a single location. As an archiving tool, zip is used for backup files as well as for transferring the files between servers. The zip file...

Hackers Show Evidence Of Attacks On Russian Institutions
Posted on April 23, 2022 at 7:28 PM Hackers have claimed to have infiltrated dozens of Russian institutions over the past two months. the group said they also broke into Kremlin’s internet censor and leaked internal documents and emails to...

$1 Million Worth of Token Gone Forever In a Failed Crypto Heist
Posted on April 22, 2022 at 8:47 PM As the decentralized finance DeFi sector keeps gaining more attention, threat actors are also looking to continue their activities on these platforms to gain financially. While many will see the DeFi platform...

Hackers Could Pose Serious Danger To EV Charging Stations, Experts Warn
Posted on April 22, 2022 at 8:35 PM Hackers are constantly looking for opportunities and avenues to carry out their threat action against companies and organizations. And as the electric vehicles (EV) industry keeps growing, threat actors will be eagerly...

Lapsus$ Breach Is Significantly Smaller Than Suspected, Okta Says
Posted on April 20, 2022 at 7:36 PM As Okta concludes its investigation of the Lapsus$ breach, the company has revealed that the actual impact of the attack is not as serious as previously feared. The company stated that its...

Top 10 hacks in the crypto sector in 2022
Posted on April 20, 2022 at 1:11 PM The decentralized finance (DeFi) space has grown significantly over the past few years, but the growth has also come with the challenge of exploits. Given that DeFi is relatively new, it is...

Do Not Fall For This Fake Windows 11 Upgrade Scam, Researchers Warn
Posted on April 19, 2022 at 7:06 PM Threat actors are increasingly looking for avenues to plant malware and disrupt network operations to make financial gains through ransoms and other means. And as cybersecurity intensifies, the bad actors regularly upgrade...

New Info-Stealing Malware Discovered Targeting Ukrainian Government
Posted on April 18, 2022 at 7:28 PM Cybersecurity researchers have warned about a new wave of social engineering attacks that threat actors use to distribute the IcedID malware. The warning also noted that the threat actors deploy Zimbra exploits...

North Korean hacking group linked to Ronin Network breach
Posted on April 17, 2022 at 9:26 AM The Ronin Network suffered from a massive breach towards the end of last month. The Ronin Network bridge for the Axie Infinity play-to-earn game suffered a theft of $625M worth of cryptocurrencies....

This Critical Bug In VMware Could Allow Hackers Launch Remote Attacks
Posted on April 16, 2022 at 8:40 AM A recent threat intelligence report showed that there is an ongoing threat activity related to the VMware Workspace One vulnerability, which includes a crypto mining activity. The report revealed that the critical...