When you get into the ransomware scene, one would think that you want to lay somewhat low while building up a decent reputation before going for the big fish. However, ransomware newcomer Mogilevich is coming out swinging with the claim that it has compromised Epic Games and made off with a good handful of data... Read more...
Over the past couple of years, the ransomware industry has exploded leading to millions in lost dollars to cybercriminals extorting businesses to regain access and control of their private data. It was thought to have reached a head when the Biden Administration sought to crack down on the threat at the International... Read more...
We've seen malware that wants to steal your files, money, or even your identity, but the new "Gold Pickaxe" mobile malware goes a step further. This nasty little piece of software is active on both Android and iOS, and it steals the victim's face. Security researchers warn the malware could be used to create deepfake... Read more...
Security researchers first spotted the Chameleon Android malware this past spring. This pervasive banking trojan has now evolved to become something much more dangerous. Through a series of fake system dialogs, the malware attempts to use the Android system Accessibility service, whic effectively gives Chameleon the... Read more...
In the threat intelligence and cybersecurity space, an interesting development has unfolded over the past few days regarding BlackCat or ALPHV, the group behind the Reddit security breach and the more recent 23AndMe data breach. It initially appeared as though the FBI had seized the group’s website, though BlackCat... Read more...
The State of Maine is informing the public of the impact to the State’s computer systems due to a security vulnerability found in the MOVEit file transfer tool, a software suite developed by Progress Software. This incident took place between May 28, 2023 and May 29, 2023. During this time, cybercriminals were able to... Read more...
Phishing emails traditionally come from threat actors looking to make a quick buck or steal some data for nefarious purposes. Things get confusing, however, when phishing-style emails come directly from an organization like Amazon. That is exactly what happened over the weekend, leaving many customers baffled... Read more...
Side channel attacks are always fascinating to see how they are executed, such as the recent discovery that encryption keys could be stolen by recording power LEDs on various devices. Researchers have found that malicious websites might be able to see usernames and other sensitive information by leaking it from... Read more...
As it turns out, hotels, and by extension, the hospitality industry, are not the most secure organizations around despite handling personal information and credit card details. This is evident in the recent MGM Hotel breach or even further back with the 2022 social engineering of Marriott. Now, an infostealer campaign... Read more...
Over the past year, as tensions have intensified with China over the South China Sea and Taiwan, the United States has begun to focus on Chinese Communist Party (CCP) influenced businesses and organizations operating or providing services in the US. Perhaps the most prevalent example of this is TikTok, and the concern... Read more...
Several energy providers are now asking New England customers to monitor their accounts for unusual activity or beware of potential scams following a third-party data breach earlier this month. Earlier this morning, HotHardware was made aware that an email had gone out from Eversource, a residential energy provider... Read more...
Drop everything—there's a new hardware security vulnerability in Intel's processors! Or don't, really, because this vulnerability is only rated at a "medium" severity by Intel itself, and it's even arguably a good thing for the company. That's because it only affects older processors based on the "Skylake"... Read more...
Canon has issued a security bulletin warning that hundreds of its inkjet printer models have a flaw that could potentially expose your Wi-Fi network details after you've disposed it or sent it to a third-party entity to be serviced. The issue at hand is that affected models, including both consumer and professional... Read more...
In recent days and weeks, Call of Duty has seen an uptick in population since the online servers were fixed up, allowing players to return to their old haunts and have some fun. However, with this uptick in activity, cheaters and hackers are looking to ruin the fun and nostalgia for CoD players. As it turns out, they... Read more...
A wide range of processors based on AMD's Zen 2 architecture, including consumer Ryzen chips (desktop and mobile) and EPYC server silicon, are vulnerable to a newly discovered exploit that could allow an attacker to steal sensitive data. That includes user passwords, encryption keys, and other information that you... Read more...
Earlier this month, researchers from Palo Alto’s Unit 42 discovered a peer-to-peer worm dubbed P2PInfect targeting Redis installations, an open-source database application used in cloud environments. While only 934 of the publicly communicating 307,000 unique Redis systems may be vulnerable, the worm may knock on the... Read more...
Apple is threatening to pull the ability to use iMessage and FaceTime from users in the UK over proposed new requirements on telecommunications operators. The new proposal is not a new law, but rather an update to the existing Investigatory Powers Act (IPA) 2016. When it comes to allowing law enforcement and... Read more...
Tech support scammers have been around for quite some time, continually innovating and perfecting their game to rake in more money. The problem has become so big that even YouTubers like Kitboga are making a living trolling these people. However, that has not been enough to stop these problematic people, as the FBI... Read more...
Microsoft’s traditional Patch Tuesday has arrived, bringing with it a slew of security fixes for 130 vulnerabilities and two published advisories. This update comes at the perfect time, as threat actors have been exploiting some of these vulnerabilities for espionage against defense and government organizations in... Read more...
You can call a kitty with a “pspspsps,” but you might be able to call Advanced Persistent Threat (APT) group 42, otherwise known as “Charming Kitten,” with a “pspspsps aux.” All jokes aside, this group, also known as TA453, now targets nuclear security and foreign policy experts to gather intelligence. Earlier this... Read more...
Attempts at or unintended incidents of tracking military members have been happening for years, such as when the Strava running app leaked the location of military bases thanks to a published heat map of running locations. Now, however, a threat actor is either being incredibly precise, or companies are just trying to... Read more...
Earlier this week, ASUS pushed a firmware update for 19 of the company’s routers which fixed nine different CVEs and enhanced security across the board. While updating your routers, ASUS also recommends that owners disable services accessible from the WAN side, such as port forwarding, DDNS, VPN, DMZ, and port... Read more...
Prev 1 2 3 4 5 Next