The leaked data includes backups of various systems, with the most recent files having an October 22 timestamp, raising concerns about potential vulnerabilities in Boeing’s IT infrastructure.
The platform confirmed the theft and plans to reimburse affected users. Poloniex offered a 5% bounty to the hacker for the return of the funds and urged a response within 7 days.
BulletProofLink offered ready-to-use phishing templates to conduct credential harvesting campaigns, targeting well-known services and engaging in double theft to maximize profits.
They have created fake skills assessment portals to trick recruiters into registering for an account. Previously, they used platforms like LinkedIn and employed lures related to skills assessment.
CherryBlos is a family of Android malware that can steal cryptocurrency by extracting sensitive information from photos on a user’s phone. This includes details related to cryptocurrency wallets, such as recovery phrases.
The industries most frequently targeted by Asian APT groups include government, industrial, healthcare, IT, agriculture, and energy sectors, emphasizing the importance of tailored security measures for these industries.
Cisco’s Talos Intelligence blog reveals a sophisticated spam exploit using Google Forms’ quiz results feature, collecting email addresses subtly via a quiz template. The spammer leverages Google’s infrastructure to send phishing emails, bypassing spam blockers until Google addresses this method, ultimately leading victims to a complex cryptocurrency scam. As these types of scams continue to […]
The attackers are targeting healthcare organizations in the U.S. using local ScreenConnect instances used by Transaction Data Systems (TDS), a pharmacy supply chain and management systems solution provider.
Attackers exploited the CVE-2023-22515 vulnerability to gain initial access and embed a web shell, allowing them to execute malicious actions without needing a valid user account.
The hospital has taken its information systems offline and is working with cybersecurity specialists and law enforcement to restore functionality, but it is unclear if a ransom has been demanded or if patient data has been compromised.