A ransomware group caught targeting a recently patched SonicWall vulnerability leveraged that vulnerability before the patch became available, Mandiant reported.The vulnerability, a SQL injection bug in SonicWall’s SMA-100 series of remote access products, was already used in a headline-grabbing attack. Hackers used the vulnerability as a zero-day to breach SonicWall itself prior to the patch […]
Multiple reports over the weekend confirmed that an attacker published details — including names, user IDs, phone numbers, and emails — of more than 533 million Facebook users on a forum.
In the Swiss city of Zurich, a hacker broke into various digital information boards on Tuesday to play porn videos on them. Information boards normally show departure times of trams and buses, now travelers using public transport were confronted with images from the Pornhub website. It is still unknown which smart bastard is behind the […]
Comparitech researchers analyzed 40+ dark web marketplaces to find out how much your credit card, Paypal, and Social Security Numbers are worth to cybercriminals. Read more about this article here: https://www.comparitech.com/blog/vpn-privacy/dark-web-prices/
A hacker remotely accessed the computer system the operator was monitoring that controls chemical levels in the water as well as other operations. The operator observed the mouse moving around on the screen to access various systems that control the water being treated. The hacker tried to poison the town’s water supply by raising the […]
The CBS of the Netherlands (Statistics office of the Netherlands) investigated how internet users from aged 12 or older take measures to protect their personal data on the internet. According to this survey, in which fa. 6,500 people took part of it, 90 percent said they had taken measures to protect their personal information on […]
A criminal organisation set up shell companies in the United States and opened bank accounts for these companies. To gain the trust of the financial institutions, members of the criminal network made transfers to the US-based accounts from different locations in the EU. Based on this trust, the American-based banks issued debit and credit cards […]
Windows Remote Desktop servers are now used to amplify DDoS attacks. A IT professional knows how to avoid this, he or she should install an independent zero trust solution that not only protects your RDP services, but also eliminates complexity wherever the service is hosted. It acts as a smart central bastion and implements Role […]
The encrypted email service Tutanota has been the target of DDOS attacks for over a month, preventing users from using the service for several days. The attacks began in mid-August and the attackers kept changing their attack vector, Tutanota said. Last weekend, the e-mail service came under fire again and this week it was busy […]
According to Dutch magazine Vrij Nederland (VN), in 2016 three ethical hackers known only as Edwin, Mattijs and Victor, scoured through the password database with the username of Donald Trump’s email address which had leaked out of LinkedIn a few years before. With the helpf of the program John the Ripper – a tool that […]