SMSFactory has already targeted more than 165,000 Avast customers from May 2021 to May 2022. Most of the victims were located in Brazil, Ukraine, Argentina, Russia, and Turkey. The main goal is to send premium texts and make calls to premium phone numbers. However, the malware can steal the contact lists on infected devices as […]
Microsoft Digital Crimes Unit (DCU) has successfully dismantled a spear-phishing operation associated with an Iranian threat actor, named Bohrium, that targeted customers in the Middle East, the U.S., and India.
In July 2017, a global law enforcement sting called Operation Bayonet took down AlphaBay’s sprawling marketplace, seizing the site’s central server in Lithuania and arresting its creator, Alexandre Cazes, outside his home in Bangkok.
The group targets misconfigured Docker Engine API endpoints with an open port 2375 for accessing daemon in default settings. Subsequently, it lists or modifies containers and runs arbitrary shell commands.
A chained, zero-day exploit could potentially expose all user data in the backend of the companion mobile application for a popular smart weight scale, security researchers have claimed.
Although 90% of cloud apps run on Linux, not much is being done to protect them from malware. Ransomware gangs and cryptomining attackers have put their sights on Linux environments.
The exposed information included full names, email addresses, and phone numbers, along with credit card information, transaction and purchased meals details, and login information stored in plain text.
Russia’s Ministry of Construction, Housing, and Utilities website has been reportedly hacked, with an internet search for the site leading to a “Glory to Ukraine” sign in Ukrainian.
It is impossible to communicate or request any publicly available service that relies on digital systems, and all citizens have to use obsolete fax machines to reach public offices.
?The WatchDog cybercriminal group is conducting a new cryptojacking campaign with advanced techniques for intrusion, worm-like propagation, and evasion of security software.