19 Aug 2019

Hackers Stole Over $4 Billion From Crypto Crimes In 2019 So Far, Up From $1.7 Billion In All Of 2018

In the first half of this year, cyber criminals stole around $4.26 billion through cryptocurrency theft, scams, and fraud campaigns, a recent CipherTrace report shows. This indicates a recent surge in criminal activity because the number is far higher than the yearly total for 2018, which was $1.7 billion. The

Read More
16 Aug 2019

ECB Says One of Its Websites Was Hacked, Data Possibly Captured

Earlier this year, a threat actor hacked the Banks’ Integrated Reporting Dictionary (BIRD) website of the European Central Bank and installed malware designed for phishing campaigns on the server of the third-party hosting provider. The ECB said the hackers may have obtained the names and email addresses of 481 subscribers

Read More
15 Aug 2019

Capital One hacker took data from more than 30 companies, new court docs reveal

New court documents relating to the massive Capital One data breach that impacts 106 million people in the US and Canada show that Paige A. Thompson, who is suspected of carrying out the hack, may have also stolen information from over 30 other organizations. US officials stated on Wednesday that

Read More
13 Aug 2019

UN Probing 35 North Korean Cyberattacks in 17 Countries

The United Nations (UN) is investigating at least 35 cyberattacks in 17 countries that are believed to be the work of hackers working for the North Korean government, an extended version of a recent UN report shows. A summary of the report released last week mentioned that Pyongyang has used

Read More
13 Aug 2019

Cloud Atlas threat group updates weaponry with polymorphic malware

Researchers with Kaspersky labs have uncovered a new attack campaign by the advanced persistent threat (APT) group Cloud Atlas (aka inception). The attacks rely on polymorphic malware that makes changes to its code for every infection in order to avoid detection by signature-based security solutions. The campaign targets the “international

Read More
13 Aug 2019

Hackers Can Turn Everyday Speakers Into Acoustic Cyberweapons

New research by PWC UK shows that the capability of many commercial speakers to emit frequencies outside the range of human hearing can enable hackers to turn these devices into acoustic weapons that produce inaudible sound or audible noise at high intensity. The study found that it is relatively simple

Read More
13 Aug 2019

Researchers Show How SQLite Can Be Modified to Attack Apps

Check Point researchers have developed a new attack technique that takes advantage of memory safety issues in the widely used SQLite database engine. It allows attackers to execute commands in applications that rely on the engine for data storage. The discovered flaws represent a very serious threat because SQLite is

Read More
12 Aug 2019

Researchers find security flaws in 40 kernel drivers from 20 vendors

Security researchers at Eclypsium have discovered major security vulnerabilities in over 40 kernel drivers from 20 different hardware vendors. The flaws are the result of poor software design choices and allow applications with limited privileges to use driver functions in order to perform malicious actions that can impact highly sensitive parts

Read More
12 Aug 2019

A Remote-Start App Exposed Thousands of Cars to Hackers

Earlier this year, a security researcher going by the moniker Jmaxxz found three critical vulnerabilities in the MyCar software that lets users remotely connect to their car’s dashboard and perform actions like starting the engine and (un)locking the vehicle. The critical flaws could have enabled hackers to gain access to

Read More
12 Aug 2019

Warning As Macs Remotely Hacked By Malicious iPhone Cable On Sale For $200

A security researcher has begun selling malicious iPhone Lightning cables that can provide attackers with remote access to Apple computers. The cables, which cost $200 each, look and function just like original Apple USB cables, except that they contain a wireless implant that can be remotely accessed by an attacker

Read More