A UK national, Joseph James O’Connor, has pleaded guilty to his involvement in the July 2020 Twitter hack that targeted numerous high-profile accounts and defrauded users of the platform. O’Connor and his co-conspirators seized control of 130 Twitter accounts, including those belonging to Barack Obama, Bill Gates, and Elon Musk, to perpetrate a cryptocurrency scam […]
Irish university MTU Cork has decided to close all four campuses for two days and cancel all classes due to an intrusion into its IT systems. The attack took place last weekend and would have been detected at an early stage. The university gives no details about what kind of attack it is exactly and […]
Twilio, which earlier this month became a sophisticated phishing attack, disclosed last week that the threat actors also managed to gain access to the accounts of 93 individual users of its Authy two-factor authentication (2FA) service.
Propietary software and technical information stolen of LastPass. No effects according to LastPass on 33 million active end-users and more than 100.000 businesses. LastPass says to update customers with transparency. Up2now LastPass didn’t elaborate on the exact mitigation techniques that it used to strengthen its environment. It also reiterated that the break-in had no impact […]
Cisco confirmed it was the victim of a cyberattack on May 24, 2022 after the attackers got hold of an employee’s personal Google account that contained passwords synced from their web browser.“Initial access to the Cisco VPN was achieved via the successful compromise of a Cisco employee’s personal Google account” “The user had enabled password […]
Nearly 8,000 digital wallets have been drained of just over $5.2 million in digital coins including solana’s sol token and USD Coin (USDC), according to blockchain analytics firm Elliptic. Engineers from multiple ecosystems, with the help of several security firms, are investigating drained wallets on solana. The suggestion is that there must have been some […]
Hackers are constantly monitoring software vendor bulletin boards for new vulnerability announcements they can leverage for initial access to a corporate network or to perform remote code execution. So how do you manage your vulnerabilities on a periodic basis?
Hackers duped a senior engineer at Axie Infinity into applying for a job at a fictitious company. The scheme resulted in the loss of $540 million in crypto earlier this year. Details of how the hack was carried out are being reported for the first time by The Block.
The America’s leading not-for-profit health plans and health care provider Kaiser Permanente,, has recently disclosed a data breach that exposed the health information of more than 69,000 individuals. An attacker accessed an employee’s email account containing patients’ protected health information (PHI) which included the patients’ first and last names, medical record numbers, dates of service […]