Friday, August 5, 2022

Malware-as-a-service lets hackers steal your data for $10 | Digital Trends

A new (and cheap) service that offers hackers a straightforward method to set up a base where they manage and perform their cyber crimes has been discovered — and it's gaining traction.

As reported by Bleeping Computer , security researchers unearthed a program called Dark Utilities, effectively providing a command and control (C2) center.

logo
Publisher: Digital Trends
Date: 2022-08-05T16:00:24 00:00
Reference: (Read more) Visit Source



Nomad Sets 10% Bounty for Hackers Returning Stolen Crypto

The sheriff of the Nomad decentralized finance project has plastered the walls of the internet with wanted posters over a recent $190 million hack of the company's systems.

Looks good
Aside from being 65" in size, this TV offers UHD 4K visuals which are a constant feast for the eyes, features HDR to make sure you can appreciate the full range of colors and contrasts, and it also allows you to use it as a hub for all of your streaming services.

logo
Publisher: Gizmodo
Date: 2022-08-05T15:01:02.367Z
Twitter: @gizmodo
Reference: (Read more) Visit Source



Explained: Why hackers keep exploiting cross-blockchain bridges

On January 7, 2022, Ethereum co-founder Vitalik Buterin warned about the security of cross-blockchain bridges. He presciently argued that bridging assets across blockchains would never enjoy the same guarantees as staying within one blockchain. He was right.

The safe convertibility of assets between blockchains is not guaranteed. To be precise, no one can actually "send" nor "bridge" an asset to another blockchain. Instead, assets are deposited, locked, or burned on one chain; then credited, unlocked, or minted on the second chain.

logo
Publisher: Protos
Date: 2022-08-05T14:58:58 00:00
Reference: (Read more) Visit Source



Hackers have found a way to log into your Microsoft account | Digital Trends

As reported by Bleeping Computer , BEC-based activity would see payments being redirected toward hackers' bank accounts via the use of forged documents.

Zscaler, a cloud security company, said that targets were involved in various industries, such as fin-tech, lending, accounting, insurance, and Federal Credit Union organizations based in the U.S., U.K., New Zealand, and Australia.

logo
Publisher: Digital Trends
Date: 2022-08-04T15:11:32 00:00
Reference: (Read more) Visit Source



25 years later, 'Soul Hackers 1' is still one of the best cyberpunk games ever made

Taking place in the harbor town of Amami City, Soul Hackers follows the nefarious tech company Algon Soft.

But no SMT game is complete without demons to collect, fuse, and fight with. This is where Soul Hackers unique brand of weird comes out.

For those who have played modern Persona and SMT games, some aspects of Soul Hackers will feel familiar. The main form of combat occurs through the summoning of demons .

logo
Publisher: Inverse
Twitter: @inversedotcom
Reference: (Read more) Visit Source



Facebook finds new Android malware used by APT hackers

Meta (Facebook) has released its Q2 2022 adversarial threat report, and among the highlights is the discovery of two cyber-espionage clusters connected to hacker groups known as 'Bitter APT' and APT36 (aka 'Transparent Tribe') using new Android malware.

Both APT36 and Bitter APT were observed orchestrating cyber-espionage campaigns earlier this year, so Facebook's report gives a new dimension to their recent activities.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Facebook Parent Meta Battles Troll Farms, Hackers - CNET

Meta has released a quarterly report that outlines the actions it's taken against troll farms, fake accounts and hackers.

The social media giant has faced scrutiny in the past for not doing enough to combat disinformation. The report provides more details about how it's tackling cybersecurity threats.

logo
Publisher: CNET
Author: Queenie Wong
Twitter: @CNET
Reference: (Read more) Visit Source



Hackers try to extort survey firm QuestionPro after alleged data theft

Hackers attempted to extort the online survey platform QuestionPro after claiming to have stolen the company's database containing respondents' personal information.

QuestionPro is an online service allowing businesses to create and conduct surveys to perform market research.

Publisher: BleepingComputer
Twitter: @BleepinComputer
Reference: (Read more) Visit Source



Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage

A threat actor is said to have "highly likely" exploited a security flaw in an outdated Atlassian Confluence server to deploy a never-before-seen backdoor against an unnamed organization in the research and technical services sector.

The attack, which transpired over a seven-day-period during the end of May, has been attributed to a threat activity cluster tracked by cybersecurity firm Deepwatch as TAC-040 .

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source



Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers

As many as 29 different router models from DrayTek have been identified as affected by a new critical, unauthenticated, remote code execution vulnerability that, if successfully exploited, could lead to full compromise of the device and unauthorized access to the broader network.

Publisher: The Hacker News
Author: https www facebook com thehackernews
Twitter: @TheHackersNews
Reference: (Read more) Visit Source







Army of the Alien Monkeys


Earth is nice. We want it.

We welcome your submission to us.




No comments:

Post a Comment