Technology

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room

A group of academics has devised a system that can be used on a phone or a laptop to identify and locate Wi-Fi-connected hidden IoT devices in unfamiliar physical spaces. With hidden cameras being increasingly used to snoop on individuals in hotel rooms and Airbnbs, the goal is to be able to pinpoint such rogue devices without much of a hassle. The […]

Lumos System Can Find Hidden Cameras and IoT Devices in Your Airbnb or Hotel Room Read More »

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks

A year-long international investigation has resulted in the arrest of the suspected head of the SilverTerrier cybercrime group by the Nigeria Police Force. “The suspect is alleged to have run a transnational cybercrime syndicate that launched mass phishing campaigns and business email compromise schemes targeting companies and individual victims,” Interpol said in a statement. <!–adsense–>

Interpol Arrests Leader of SilverTerrier Cybercrime Gang Behind BEC Attacks Read More »

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Two trojanized Python and PHP packages have been uncovered in what’s yet another instance of a software supply chain attack targeting the open source ecosystem. One of the packages in question is “ctx,” a Python module available in the PyPi repository. The other involves “phpass,” a PHP package that’s been forked on GitHub to distribute

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys Read More »

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups

Even as the operators of Conti threatened to overthrow the Costa Rican government, the notorious cybercrime gang officially took down its attack infrastructure in favor of migrating their malicious cyber activities to other ancillary operations, including Karakurt and BlackByte. “From the negotiations site, chatrooms, messengers to servers and proxy hosts – the Conti brand, not

Conti Ransomware Operation Shut Down After Splitting into Smaller Groups Read More »

New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild

Cybersecurity researchers have disclosed details of the latest version of the Chaos ransomware line, dubbed Yashma. “Though Chaos ransomware builder has only been in the wild for a year, Yashma claims to be the sixth version (v6.0) of this malware,” BlackBerry research and intelligence team said in a report shared with The Hacker News. Chaos

New Chaos Ransomware Builder Variant “Yashma” Discovered in the Wild Read More »

SIM-based Authentication Aims to Transform Device Binding Security to End Phishing

Let’s face it: we all use email, and we all use passwords. Passwords create inherent vulnerability in the system. The success rate of phishing attacks is skyrocketing, and opportunities for the attack have greatly multiplied as lives moved online. All it takes is one password to be compromised for all other users to become victims of

SIM-based Authentication Aims to Transform Device Binding Security to End Phishing Read More »

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

Fronton, a distributed denial-of-service (DDoS) botnet that came to light in March 2020, is much more powerful than previously thought, per the latest research. “Fronton is a system developed for coordinated inauthentic behavior on a massive scale,” threat intelligence firm Nisos said in a report published last week. “This system includes a web-based dashboard known as SANA

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns Read More »

Yes, Containers Are Terrific, But Watch the Security Risks

Containers revolutionized the development process, acting as a cornerstone for DevOps initiatives, but containers bring complex security risks that are not always obvious. Organizations that don’t mitigate these risks are vulnerable to attack.  In this article, we outline how containers contributed to agile development, which unique security risks containers bring into the picture – and

Yes, Containers Are Terrific, But Watch the Security Risks Read More »

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT). The attacks, codenamed “Twisted Panda,” come in the backdrop of Russia’s military invasion of Ukraine, prompting a wide range of threat actors to swiftly adapt their

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes Read More »