Category: Technobabble

Improvements to boost the attack surface view, ports & more

TL/DR: Users now get additional insights on what is discovered on the attack surface. This includes information such as when an asset was last seen and to what extent an asset is exposed online, and much more. The attack surface...

/ April 29, 2022

Trezor Phishing Attack Victims Seek Compensation From Intuit

Posted on April 25, 2022 at 7:29 PM Financial software firm Intuit Inc is facing a class-action lawsuit over the recent phishing attack on Trezor wallets. The lawsuit was filed by victims of the cryptocurrency heist, with a man from...

/ April 25, 2022

Use of Zip and Unzip command in Linux

Zip is a file format that helps to compress one or more files together into a single location. As an archiving tool, zip is used for backup files as well as for transferring the files between servers. The zip file...

/ April 23, 2022

Hackers Show Evidence Of Attacks On Russian Institutions

Posted on April 23, 2022 at 7:28 PM Hackers have claimed to have infiltrated dozens of Russian institutions over the past two months. the group said they also broke into Kremlin’s internet censor and leaked internal documents and emails to...

/ April 23, 2022

$1 Million Worth of Token Gone Forever In a Failed Crypto Heist

Posted on April 22, 2022 at 8:47 PM As the decentralized finance DeFi sector keeps gaining more attention, threat actors are also looking to continue their activities on these platforms to gain financially. While many will see the DeFi platform...

/ April 22, 2022

Hackers Could Pose Serious Danger To EV Charging Stations, Experts Warn

Posted on April 22, 2022 at 8:35 PM Hackers are constantly looking for opportunities and avenues to carry out their threat action against companies and organizations. And as the electric vehicles (EV) industry keeps growing, threat actors will be eagerly...

/ April 22, 2022

Lapsus$ Breach Is Significantly Smaller Than Suspected, Okta Says

Posted on April 20, 2022 at 7:36 PM As Okta concludes its investigation of the Lapsus$ breach, the company has revealed that the actual impact of the attack is not as serious as previously feared. The company stated that its...

/ April 20, 2022

Top 10 hacks in the crypto sector in 2022

Posted on April 20, 2022 at 1:11 PM The decentralized finance (DeFi) space has grown significantly over the past few years, but the growth has also come with the challenge of exploits. Given that DeFi is relatively new, it is...

/ April 20, 2022

Do Not Fall For This Fake Windows 11 Upgrade Scam, Researchers Warn

Posted on April 19, 2022 at 7:06 PM Threat actors are increasingly looking for avenues to plant malware and disrupt network operations to make financial gains through ransoms and other means. And as cybersecurity intensifies, the bad actors regularly upgrade...

/ April 19, 2022

New Info-Stealing Malware Discovered Targeting Ukrainian Government

Posted on April 18, 2022 at 7:28 PM Cybersecurity researchers have warned about a new wave of social engineering attacks that threat actors use to distribute the IcedID malware. The warning also noted that the threat actors deploy Zimbra exploits...

/ April 18, 2022

North Korean hacking group linked to Ronin Network breach

Posted on April 17, 2022 at 9:26 AM The Ronin Network suffered from a massive breach towards the end of last month. The Ronin Network bridge for the Axie Infinity play-to-earn game suffered a theft of $625M worth of cryptocurrencies....

/ April 17, 2022

This Critical Bug In VMware Could Allow Hackers Launch Remote Attacks

Posted on April 16, 2022 at 8:40 AM A recent threat intelligence report showed that there is an ongoing threat activity related to the VMware Workspace One vulnerability, which includes a crypto mining activity. The report revealed that the critical...

/ April 16, 2022