Browsing category

Data Security

GTA 5 Grand Theft Auto 5 Source Code published on GitHub

Yesterday evening, a number of Tweets with the “Grand Theft Auto V” source code appeared on social media. The source code was published on Twitter and Facebook as well as uploaded to a GitHub page.It appears that portion of Grand Theft Auto 5’s source code has been unauthorizedly posted to GitHub. The source code has […]

6 factors to consider for prioritizing remediation of vulnerabilities in a network using SSVC strategy

Given that 2021 set a record for the number of vulnerabilities disclosed and that threat actors improved their capacity to weaponize vulnerabilities, prompt and intelligent prioritization and repair of vulnerabilities should be a priority for all businesses. Despite the fact that the US Cybersecurity and Infrastructure Security Agency (CISA) frequently publishes lists of the most […]

Don’t even think of taking your real smartphone to FIFA world cup matches in Qatar. Immigration officials will gain access to your phone data forever

It would be wise to get a burner phone if you were traveling to Qatar for the World Cup. Additionally, avoid taking any pictures that would violate the Gulf state’s stringent morals regulations. Football fans are being advised on how to shield themselves from the Qatar World Cup applications’ spying by France’s powerful data protection […]

Australian government is issuing new driving licenses to millions and changing the license verification process because of the Optus data breach

Following the Optus data breach, Queenslanders are now required to give banks, telecoms, and utility firms a second number on their driver’s license to verify their identity.People will have to supply both the card number and the license number starting this week. Every time a license is issued or changed, a new card number is […]

What is MFA, 2FA, 3FA and 4FA ? Just ways of user authentication?

Authentication is the process of demonstrating your identity. The user must verify their identity by supplying particular access credentials in order to access protected information, systems, or places. The primary categories of authentication elements are as follows: Factors of knowledge (what the user is aware of): For instance, a PIN, passphrase, or password. Possession factors: […]

Update firmware of these Lenovo ThinkBook, IdeaPad, and Yoga laptops models as 3 critical vulnerabilities allow them to be hacked forever, even after removing the hard drive

Critical flaws that affect many ThinkBook, IdeaPad, and Yoga laptop models have been resolved by Lenovo and may have allowed an attacker to disable UEFI Secure Boot. Researchers from ESET found these flaws in drivers in several Lenovo systems and informed the computer maker of their discovery. ESET published a link to a Twitter thread by […]

Don’t open emails from Microsoft Dynamics 365. Threat actors are exploiting its flaws to send phishing emails with legitimate Microsoft links

Microsoft’s Dynamics 365 Customer Voice is a software that is primarily used to collect customer feedback.It may be utilized to gather data into actionable insights, track consumer feedback, and conduct polls of client satisfaction. To communicate with victims, hackers are exploiting the Static Expressway. In a nutshell, it’s a method for evading security scanners that […]

How a hacker who stole data of millions of people was tracked & arrested because his girlfriend uploaded this pic on Instagram

The United States Department of Justice has announced that a Ukrainian programmer has been charged, among other things, with computer and bank fraud in the United States. This is Mark Sokolovsky, one of the key figures behind Raccoon Infostealer, a well-known malware capable of infecting millions of computers. This malware was rented to cybercriminals for […]

A proof-of-concept (PoC) exploit code released for critical privilege elevation vulnerability CVE-2022-37969 (CVSS score: 7.8) affecting Windows 10 & 11

The Windows Common Log File System (CLFS) Driver has an elevation of privilege vulnerability identified as CVE-2022-37969 (CVSS score: 7.8). For reporting this vulnerability, Microsoft gave credit to Quan Jin of DBAPPSecurity, Genwei Jiang with Mandiant, FLARE OTF, CrowdStrike, and Zscaler ThreatLabz. Software clients can make advantage of the general-purpose logging service known as the […]

Message Encryption (OME) used by Office 365 can easily be broken to read encrypted emails via MiTM

The message encryption system employed by Microsoft in Office 365 has a system vulnerabilities, according to a warning from the Finnish cybersecurity company WithSecure. According to WithSecure’s alert, the Office 365 Message Encryption (OME) security technique is defective, which makes it possible for the Microsoft 365 security vulnerability to be used to infer message contents. […]

Gang of 31 cyber criminals arrested for stealing cars via hacking software

In a coordinated operation on October 10 throughout the three nations, 31 people were detained. A total of 22 addresses were raided, and illicit assets worth over EUR 1 098 500 were recovered. The French authorities, working with their Spanish and Latvian counterparts, busted a car theft ring that utilized counterfeit software to steal automobiles […]

Minecraft Servers suffer Underwent a 2.5 Tbps DDoS Attack from the Mirai Botnet

According to Cloudflare, a Mirai botnet strain launched a distributed denial-of-service (DDoS) campaign that peaked at 2.5 terabytes per second (Tbps), making it the greatest attack it has ever encountered. UDP and TCP floods were used in the attack, which targeted Wynncraft, a Minecraft server. The internet security company said that by containing the attack, […]

New technique to jailbreak PlayStation PS5 published

Researchers have at last cracked the PlayStation’s security after nearly two years of work. The PS5 has been jailbroken and completely unlocked, making this the device’s first serious hack since its introduction in 2020. Lance McDonald, a well-known gamer and broadcaster, shared a video of his recently jailbroken PS5 system on Twitter showcasing some of […]

How Chinese threat actors are using recently discovered zero day flaws in office and Sophos firewall

By deploying a new Trojan named LOWZERO, integrated into an espionage campaign aimed against Tibetan organizations, the Chinese APT known as TA413 is exploiting a variety of flaws in Microsoft Office and Sophos Firewall. The majority of the targets were businesses connected to the exiled Tibetan administration as well as organizations connected to the Tibetan […]

Hacker who leaked data of millions of Australians is regretting his act and asking for an apology

A hacker who allegedly targeted Optus, Australia’s second-largest telecom company, and stole the personal information of millions of Australians, has posted more material online. In the past, the hacker demanded a ransom payment of around $1 million in return for client information. On Tuesday, the attacker changed his mind about this demand. Names, email addresses, […]

Phishing alert: Giving your condolences for Queen Elizabeth II can leave your data in the hands of cybercriminals

Cybercriminals are taking advantage of the death of Queen Elizabeth II to launch phishing attacks, specifically these scammers directing users to malicious pages that are designed to steal Microsoft credentials. Proofpoint (cybersecurity company) has detected fraudulent emails where cybercriminals pose as the Microsoft team to try to deceive recipients, thus getting victims to sign a […]