Browsing tag

Security

Why torrenting on Elon Musk’s Starlink is not a good idea?

Starlink sends piracy warnings to users urging them to avoid downloading any illegal content by using their service.  If you are one of those people who keenly rely on torrenting pirated movies, software, and other content from the dark depths of the web to enjoy, then Starlink is not for you. This broadband is stern […]

WifiDemon – iPhone Wifi bug exposed devices to remote attacks

Dubbed WifiDemon by researchers; the attack required the victim’s wifi to be set on auto-join which is by default in iPhones. Just about a month ago, a bug was discovered in Apple’s iPhone devices that disabled the WIFI functionality of the phone if it connected to a personal hotspot with a specific SSID containing a […]

U.S Govt launches new website to fight ransomware, help victims

The US government is also offering $10 million in rewards for information on foreign hackers involved in ransomware attacks on the United States. With the recent wave of ransomware attacks deeply impacting businesses across the United States, Washington has decided to take direct action. In the latest, it has announced rewards that go up to […]

Misconfigured AWS bucket exposed 421GB of Artwork Archive data

The trove of data was left exposed unencrypted and without any password or security authentication. The team of IT security researchers at WizCase team discovered a misconfigured Amazon S3 bucket belonging to the online art retail service Artwork Archive. The incident affected around 7,000 customers including galleries, artists, and collectors. Private and Purchase Data Exposed […]

How data collected in gaming can be used to breach user privacy

“Surveilling the Gamers: Privacy Impacts of the Video Game Industry,” a new research reveals how personal and financial data collected by gaming giants can become a privacy disaster for unsuspected gamers. The gaming industry today is worth more than $300 billion, thanks to the huge growth we have seen in the past few years. This […]

Passwords by Kaspersky Password Manager exposed to brute-force attack

If you are using Kaspersky Password Manager (KPM) for creating passwords, you might want to consider regenerating those you created before October 2019. According to Donjon, a security research team at Ledger passwords generated by KPM are so weak that it is easy to brute-force them. Researchers claim that they started analyzing Kaspersky’s password manager […]

Hackers leak scraped data of 87,000 GETTR users

GETTR, a pro-Trump social media platform, has been attacked twice since its launch on July 4th, 2021. GETTR is a Twitter-inspired social media platform. It was launched on July 4th, 2021, and is the brainchild of former US President Donald Trump’s ex-spokesman Jason Miller. On Tuesday, a hacker posted a database claiming that it contained […]

Hackers disabling Macro security warnings in new malspam campaign

Usually, hackers utilize weaponized MS Office documents or other social engineering tactics in malspam campaigns to trap unsuspecting users and let them enable the macros. However, things have changed and new attack discovered by researchers is critical than ever. According to a report from McAfee Labs experts, threat actors are using a new technique in […]

New LinkedIn phishing campaign found using Google Forms

In the latest LinkedIn phishing scam, the sender’s email address appears to be from Paul University which is based in Nigeria. Phishing scams are one of the most often done owing to their simplicity and sadly, reliability as well. In the latest, researchers from ArmorBlox have discovered a new LinkedIn phishing campaign that targeted approximately […]

Microsoft issues emergency patch to fix PrintNightmare vulnerability

Microsoft is urging customers to “install these updates immediately.” Last week, the IT security researchers at Sangfor revealed a critical 0-day vulnerability affecting the Windows Print Spooler service that helps PCs manage the flow of print jobs being sent to a printer or print server. Dubbed PrintNightmare (CVE-2021-1675) by researchers; Microsoft acknowledged the vulnerability however […]

T-Mobile hacker used brute force attack to steal customers’ data

A 21-year-old US citizen named John Binns has claimed responsibility for the T-Mobile data breach and labeled the carrier’s “security is awful.” Earlier this month, T-Mobile suffered a data breach in which a hacker claimed to steal the personal data of 100 million customers. Although the company acknowledged the breach yet claimed that the incident […]

SEC charges dark web user of insider trading, money laundering

The accused is a Greek national who used AlphaBay marketplace with the alias “The Bull” on the dark web for insider trading information. The Securities and Exchange Commission charged a 30-year-old Greek national, Apostolos Trovias, for securities fraud and money laundering. The SEC states that Trovias, who used the screen name The Bull, is an […]

Online learning provider New Skills Academy alerts users of data breach

According to New Skills Academy’s data breach notification email seen by Hackread.com, the number of victims impacted by the breach is yet unknown. New Skills Academy, a major online learning provider based in Hertford, United Kingdom has suffered a data breach in which account information of its customers has been exposed to unauthorized sources. SEE: […]

Watch as hackers disrupt Iran’s prison computers; leak live footage

The group of hackers behind the cyberattack on the Iranian prison goes by the name of Edaalate Ali – The footage shows dire human rights conditions in the prison. Iran has always tried to portray it as a country where human rights are valued and laws are duly abided by. However, the security camera footage […]

Microsoft signed a driver called Netfilter, turns out it contained malware

Microsoft acknowledged the incident and currently investigating the issue but at the same time downplaying its impact. In recent news, it has been found that Microsoft signed off a third-party driver, Netfilter, for Windows that contains rootkit malware and has been circulating mainly amongst the gaming community. This was first found out by Karsten Hahn, […]

New variant of PRISM Backdoor ‘WaterDrop’ targets Linux systems

According to researchers, the PRISM backdoor has been on their radar for more than 3.5 years. Security researchers at AT&T Labs have published a report sharing details of a newly discovered Linux ELF executables cluster having zero to low antivirus detections on VirusTotal. Researchers noted that these executables have a modified version of the open-source backdoor […]

A hacker is selling 700 million LinkedIn users accounts

LinkedIn has not suffered data breach but the records being sold are collected through data scraping technique. Two months back, Hackread.com exclusively reported a staggering data leak compiled as a result of data scraping involving LinkedIn where threat actors posted 500 million and over 800 million LinkedIn user profiles up for sale on a hacker […]

REvil Ransomware targets 1000+ businesses causing holiday havoc

Reportedly, Revil ransomware is demanding $5 million in ransom. Not many ransomware gangs survive long enough to victimize one company after another successfully. Most are dissected by cybersecurity researchers and taken care of usually. However, the REvil ransomware happens to be one of the former which has been proven once again with the latest news […]

Unpatched flaws exposing Linux marketplaces to remote attacks

Cybersecurity researchers at Berlin-based infosec company Positive Security have identified two serious zero-day vulnerabilities impacting Pling-based FOSS (free and open-source software) marketplaces for Linux. The vulnerabilities remain unpatched and can be exploited to launch supply-chain attacks or achieve RCE (remote code execution) against Linux marketplaces. The vulnerabilities were discovered in Opendesktop’s Pling. Positive Security’s co-founder […]

Millions of IoT devices, baby monitors open to audio, video snooping

The vulnerability would allow threat actors to remotely compromise a targeted ThroughTek IoT device and watch the real-time video feed, listen to audio, and compromise device credentials for additional attacks. The cybersecurity researchers at FireEye have shared details of a critical IoT supply chain vulnerability that might be exposing millions of ThroughTek internet-connected cameras to espionage. […]