A serious vulnerability in the Kalay cloud platform has been discovered, exposing millions of IoT devices to cyberattacks. The major vulnerability, named CVE-2021-28372, was identified by FireEye’s Mandiant researchers…
Tag: recent ransomware attacks
Liquid – Japan based crypto exchange lost over $90 million after hack
Liquid, a cryptocurrency exchange based in Japan, was hit by a cyber-attack in which its warm wallets were hacked and $94 million in assets were stolen. Deposits and withdrawals…
Pharmacist charged for selling vaccination cards on eBay
An Illinois pharmacist has been charged with selling dozens of genuine COVID-19 immunisation record cards supplied by the Centers for Disease Control and Prevention (CDC). According to FBI Special…
Iranian hackers are targeting Israeli organizations with supply chain attacks
Iranian hackers have impersonated Israeli IT and communication enterprises and their HR employees to target victims with fraudulent employment offers in order to gain access to their computers and the company’s…
Cinobi Banking Trojan used to target crypto users with malvertisments
A new social engineering-based malvertising campaign targeted at the Japanese market has been discovered, delivering a malicious application that install a banking trojan (Cinobi), on infected Windows devices in order…
Ford bug reveals customer and employee data from internal systems
A flaw in Ford Motor Company’s website enabled access to critical systems and the acquisition of confidential data such as customer databases, employee records, internal tickets, etc. A misconfigured…
T-Mobile hacked: 100 million customers data stolen, says hacker
T-Mobile’s servers were hacked, and databases containing the personal information of about 100 million consumers were stolen, according to a threat actor. T-Mobile is investigating the alleged data breach, which…
Glowworm Attack Turns LED Flickers into Audio
A new Glowworm attack method takes advantage of the optical emanations from a device’s power indicator LED to recover audio from attached peripherals and listen in on electronic conversations from…
Hackers use Morse code in phishing attacks to hide detection
Microsoft unveiled a phishing attack group’s new strategy, which included a “jigsaw puzzle” technique as well as odd characteristics such as Morse code dashes and dots to disguise their attacks.…