Browsing category

Data Security

Critical flaw in Azure Storage Account Keys design could allow easy hack

A “design issue” that was discovered in Microsoft Azure might be used by attackers to get access to storage accounts, move laterally inside the system, and even execute remote code. These goals could be accomplished by exploiting the bug. “It is feasible to abuse and utilize Microsoft Storage Accounts by manipulating Azure Functions to steal […]

Most dangerous spanish hacker arrested because of his stupidity

The Spanish police have said that they have been successful in locating the notorious hacker known as Alcasec. Alcasec is suspected of being a cybercriminal who launched attacks on the systems of the Spanish Court and other organizations in 2022. After these operations, the attacker was successful in acquiring useful information about a significant portion […]

How to create undetectable malware via ChatGPT in 7 easy steps bypassing its restrictions

There is evidence that ChatGPT has helped low-skill hackers generate malware, which raises worries about the technology being abused by cybercriminals. ChatGPT cannot yet replace expert threat actors, but security researchers claim there is evidence that it can assist low-skill hackers create malware. Since the introduction of ChatGPT in November, the OpenAI chatbot has assisted […]

I think someone is spying me using AirTag, what should I do?

Keeping track of your most vital belongings, such as your keys, wallet, remote controls, and even motorcycles, may be made easier with the assistance of an Apple AirTag. Yet, allegations that they were utilized to monitor individuals without first obtaining their permission threw an unfavorable light on the utilization and implementation of these technologies. It’s […]

Best open source tool for cyber incident detection in Microsoft Azure, Azure Active Directory, and Microsoft 365

The Goose Tool is a new free tool that may assist network defenders in identifying possibly malicious activities in Microsoft Azure, Azure Active Directory, and Microsoft 365 environments. It was developed by CISA and is available on their website. The Unidentified Goose Tool, which was developed with assistance from Sandia National Laboratories, provides network defenders […]

5 best practices for securing identity and access management (IAM) systems

The term “identity and access management,” or “IAM,” refers to a framework of corporate procedures, regulations, and technology that support the management of digital identities to guarantee that users only obtain access to data when they have the right credentials. Identity and access management is abbreviated as “IAM.” In addition to the actual users,  IAM […]

Why famous cyber criminal forum Breach Forums has been closed down forever?

Breach Forums, a notorious site for hackers and cybercriminals, has been closed down forever. Conor Brian Fitzpatrick (as Pompompurin, nicknamed Pom), the owner, creator, and administrator of Breach Forums, was arrested in New York on March 18th, 2023. The day after Fitzpatrick’s arrest, one of the forum’s administrators, using by the moniker Baphomet, claimed responsibility […]

New cryptojacking malware can hack in Kubernetes clusters using this easy trick

Dero is a relatively new cryptocurrency that places a strong emphasis on privacy. It utilizes directed acyclic graph (DAG) technology, which allows it to make the claim that its transactions are completely anonymous. The combination of anonymity and a greater rewards ratio makes it potentially attractive for cryptojacking organizations in comparison to Monero, which is […]

Blackbaud, a cloud software provider, fined $3 million for failing to notify customers of a ransomware attack

The U.S. Securities and Exchange Commission (SEC) made the announcement today that Blackbaud Inc., a public company located in South Carolina that offers donor data management software to non-profit organizations, has agreed to pay $3 million to resolve charges for providing deceptive statements about a ransomware attack in 2020 that affected more than 13,000 clients. […]

SHEIN Android app intentionally copied 100 million people’s clipboard content

The contents of the clipboard may be an enticing target for cyberattacks since mobile users often copy and paste sensitive information, such as passwords or payment information, using the clipboard. By using clipboards, attackers may be able to acquire information about their targets and exfiltrate valuable data. Even instances of attackers seizing control of the […]