Home Search
Azure - search results
If you're not happy with the results, please do another search
Samsung Hacked – Breach Exposed Customer’s Personal Information
Samsung suffers a data breach for second time that exposes customer information in the US. The company notified its customers regarding the breach that...
Dangerous SharkBot Malware Back on Google Play as Fake Antivirus Apps
Fox IT has observed an upgraded version of the SharkBot malware active in the Google Play and dropping a new version of Sharkbot. This...
IRS Data Leak – Over 120,000 User Data Leaked
It has been discovered that over 120,000 taxpayers' confidential information was accidentally leaked by the IRS (Internal Revenue Service). As part of their tax...
Google Chrome Bug Lets Sites Write to Clipboard Without Asking
There was an unintended bug introduced in version 104 of Google Chrome. It has been found in the bug that there is no need...
Chinese Hackers ScanBox Framework To Deploy Malware on Selected Targets
In the South China Sea, Chinese threat actors have targeted wind turbine fleets and Australian government agencies as a means of extortion. A fake...
Cybercriminals Released Mini Stealer’s Builder & Panel for Free on a Cybercrime Forum
A threat actor has recently released MiniStealer’s builder and panel for free on a cybercrime forum. Cyble Research and Intelligence Labs (CRIL) security analysts...
New Malware Campaign Disguised as Google Translate Distribute Cryptocurrency Miner
Cryptocurrency mining malware has been found recently in an ongoing campaign in 11 countries disguised as Google Translate and MP3 downloaders.In order to distribute...
Iranian state-sponsored Actors Exploiting Log4j 2 Flaws in Unpatched Systems
As far as exploiting unpatched Log4j systems to target Israeli entities are concerned, the Iranian state-sponsored threat actors leave no stone unturned to exploit...
LastPass Developer Account Hacked to Steal the Company’s Source Code
LastPass, a freemium password management company was hacked which allows an unauthorized party gain access and steal portions of source code and some proprietary...
ETHERLED – A New Attack Method to Exfiltrate Data from Air-Gapped Devices using LED...
A researcher from Israel, Mordechai Guri, has concluded that he has discovered the possibility of exfiltrating data from air-gapped systems using the LED indicators...