23 Nov 2021

Data from millions of Brazilians exposed in Wi-Fi management software firm leak

The data of millions of Brazilians have been exposed by WSpot, a software provider that enables businesses to secure on-premise Wi-Fi networks and allow password-free online access to customers. The leak was discovered by SafetyDetectives after researchers found WSpot’s misconfigured Amazon Web Services bucket left exposed. The bucket contained 10GB

Read More
19 Nov 2021

FatPipe VPN Zero-Day Exploited by APT for 6 Months

The FBI released an alert stating that the advanced persistent threat groups (APTs) have been exploiting a zero-day flaw in FatPipe’s virtual private network as a way to breach companies and gain access to internal networks. The FBI stated that the threat groups have been exploiting the zero-day vulnerability since

Read More
19 Nov 2021

North Korean Hacking Group Targets Diplomats, Forgoes Malware

A North Korean cyber-operations group has focused on targeting diplomats and regional experts in its cyber espionage campaigns. It uses captured credentials to sustain phishing attacks and rarely uses malware to attack the targets. The North Korean group was found to mainly target individuals in the United States, Russia and

Read More
18 Nov 2021

Tech CEO Pleads to Wire Fraud in IP Address Scheme

Amir Golestan, the former CEO of a South Caroline technology firm called Micfo LLC, has pleaded guilty to 20 counts of wire fraud in connection with an extensive network of phone companies. The phone companies were set up to obtain more than 735,000 Internet Protocol (IP) addresses from the nonprofit

Read More
18 Nov 2021

CISA Releases Incident and Vulnerability Response Playbooks

The Cybersecurity and Infrastructure Security Agency (CISA) has released two cybersecurity playbooks that focus specifically on incident and vulnerability response. The guides were released in response to an executive order signed in May by President Joe Biden. The executive order was focused on improving the nation’s cybersecurity readiness. The order

Read More
18 Nov 2021

Dallas Police Surveillance Footage Leaked

Cybersecurity firms have discovered video footage allegedly stolen from American law enforcement agencies located in Texas and Georgia. The footage appears to have been leaked online by a transparency collective Distributed Denial of Secrets. The group shared 1.9TB of data, claiming that the files consist of 600 hours of aerial

Read More
17 Nov 2021

Now Iran’s state-backed hackers are turning to ransomware

Microsoft has found that six different Iranian hacker groups are behind new waves of ransomware attacks that have been identified every six to eight weeks since the fall of 2020. The Iranian hackers are allegedly deploying ransomware to disrupt targets or to collect funds. Microsoft stated that the hacking groups

Read More
17 Nov 2021

Belarus government accused of ‘partial responsibility’ for Ghostwriter campaigns

Researchers at Mandiant have attributed Ghostwriter campaigns to the government of Belarus. Cybersecurity companies tend to use caution when attributing certain acts to threat groups, however, Mandiant identified the government with high confidence. Ghostwriter’s activities are linked to UNC115, a cybercriminal outfit also known to have ties to the Belarusian

Read More
16 Nov 2021

Cybercriminals Target Alibaba Cloud for Cryptomining, Malware

According to Trend Micro researchers, threat groups have been disabling features in Alibaba Cloud ECS to plant malware and perform crypto mining or jacking. Cybercriminals are allegedly targeting Alibaba Elastic Computing Search instances and disabling certain security features that prevent them from achieving their goals when it comes to cryptomining.

Read More
16 Nov 2021

This new attack bypasses Rowhammer defenses in most DRAM, say researchers

Researchers have discovered a new type of Rowhammer attack targeting DRAM devices that can bypass mitigations created by vendors after the first such attacks were detected back in 2014. In DRAM devices, data is stored in grids of memory. The Rowhammer attack method works through rapidly and repeatedly reading data

Read More