Hackers have seized $53 million worth of cryptocurrency from CoinEx. Hackers violated the site's hot wallets, taking the cryptocurrency, with CoinEx reassuring that user assets had not been impacted by the incident.
In today's roundup; Addresses forged via email forwarding, the Sri Lankan attack causes government data loss, and Pune reports a spike in cybercrime cases.
Dunghill Leak group claims responsibility for Sabre attack The Dunghill Leak group has claimed responsibility for the cyberattack on
New RAT variant gives control over Android devices The Indian government has warned of a malware attacking Android users
In today's roundup; Russian threat actors target the Ukranian Military, browser-hacking malware found on the phones of Xiaomi users, and a LockBit data leak.
In this roundup; experts warn of new 'polyglot' malware, AI neutralizes trillions of IT events, and Northern Ireland data breach suspects have been arrested.
In this roundup; Trojan apps found on the Google Play Store, LogicMonitor customers are targeted in attacks, and the latest trend of celebrity account hacks.
In today's roundup; a Chinese cyberespionage group deploys malware, new Android malware, MMRat, unlocks phones, and DreamBus malware targets RocketMS servers.
In today's roundup; FIN8 threat actors exploit gateway risk, the University of Michigan's cyber attack, and the FBI taking down the Qakbot offender.
New updated KmsdBot now targets Internet of Things (IoT) An updated version of KmsdBot now includes support for Telnet scanning
Hackers hold Prospect Medical's data 'hostage' Hacker group Rhysida has been identified as the mastermind behind the recent ransomware attack
A new malware strain that gives the location of an infected device has been identified. The Hacker News explains that the malware has one operation: 'Every minute it triangulates the infected systems' positions by scanning nearby Wi-Fi Access points as a data point for Google's geolocation API.' Cyber experts aren't yet clear 'who or what' is interested in the location of an infected device or the motives behind why this specific form of malware was produced.
The malicious threat actor behind CypherRAT and CraxsRAT malware has been unmasked as the Syrian threat actor, EVLF. These RATS allow an attacker to control a victim's device's location, camera, and microphone.
In today's roundup; XLoader, OfficeNote copycat hides malicious code, hosting firm refuses to pay ransom, and Cybersmart announces $15 million series B funding.
Popular language learning app Duolingo saw a bug exploited that resulted in a compilation of account information from over 2.6 million users. According to VX-Underground, the largest collection of malware source code, samples, and papers on the internet, “sending a valid email to the API returns generic account information on the user (name, email, languages studied).” The data collected will be used for Doxxing.
Sign in to your account