Wanted Russian Hacker Linked to Hive and LockBit Ransomware Arrested https://firewall.firm.in/wp-content/uploads/2024/12/hackers.png Nov 30, 2024Mohit KumarRansomware / Cybercrime A Russian cybercriminal wanted in the U.S. in connection with LockBit and Hive ransomware operations has been arrested by law enforcement authorities in the country. According to a news report from Russian media outlet RIA Novosti, Mikhail Pavlovich Matveev has been accused of ...
Read More »Vulnerabilities & Exploits
ByteDance seeks $1.1 million damages from intern in AI breach case: Report – ET CISO
ByteDance seeks $1.1 million damages from intern in AI breach case: Report – ET CISO https://etimg.etb2bimg.com/thumb/msid-115792744,imgsize-15066,width-1200,height=765,overlay-etciso/data-breaches/bytedance-seeks-1-1-million-damages-from-intern-in-ai-breach-case-report.jpg China’s ByteDance is suing a former intern for $1.1 million, alleging he deliberately attacked its artificial intelligence large language model training infrastructure, a case that has drawn widespread attention within China amid a heated AI race. The parent company of TikTok is seeking 8 ...
Read More »AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections
AI-Powered Fake News Campaign Targets Western Support for Ukraine and U.S. Elections https://firewall.firm.in/wp-content/uploads/2024/11/fakenews.png Nov 29, 2024Ravie LakshmananDisinformation / Artificial Intelligence A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence operation designed to turn public opinion against Ukraine and erode Western support since at least December 2023. The covert campaign undertaken by Social ...
Read More »U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider https://firewall.firm.in/wp-content/uploads/2024/11/t-mobile.png Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent weeks but noted that no sensitive data was accessed. These intrusion attempts “originated from a wireline provider’s network that was ...
Read More »Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks
Critical WordPress Anti-Spam Plugin Flaws Expose 200,000+ Sites to Remote Attacks https://firewall.firm.in/wp-content/uploads/2024/11/wordpress.png Nov 26, 2024Ravie LakshmananVulnerability / Website Security Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin WordPress could allow an unauthenticated attacker to install and enable malicious plugins on susceptible sites and potentially achieve remote code execution. The vulnerabilities, tracked as CVE-2024-10542 and CVE-2024-10781, carry ...
Read More »Google’s New Restore Credentials Tool Simplifies App Login After Android Migration
Google’s New Restore Credentials Tool Simplifies App Login After Android Migration https://firewall.firm.in/wp-content/uploads/2024/11/android.png Nov 25, 2024Ravie LakshmananMobile Security / Privacy Google has introduced a new feature called Restore Credentials to help users restore their account access to third-party apps securely after migrating to a new Android device. Part of Android’s Credential Manager API, the feature aims to reduce the hassle of ...
Read More »Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites
Google Exposes GLASSBRIDGE: A Pro-China Influence Network of Fake News Sites https://firewall.firm.in/wp-content/uploads/2024/11/china.png Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental organizations in the United States have become the target of a nascent China state threat actor known as Storm-2077. The adversary, believed to be active since at least January 2024, has also conducted cyber attacks against ...
Read More »Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments
Ghost Tap: Hackers Exploiting NFCGate to Steal Funds via Mobile Payments https://firewall.firm.in/wp-content/uploads/2024/11/payment-fraud.png Nov 20, 2024Ravie LakshmananPayment Security / Cybercrime Threat actors are increasingly banking on a new technique that leverages near-field communication (NFC) to cash out victim’s funds at scale. The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked to mobile payment ...
Read More »Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts
Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts https://firewall.firm.in/wp-content/uploads/2024/11/streaming.png Nov 19, 2024Ravie LakshmananCloud Security / Piracy Malicious actors are exploiting misconfigured JupyterLab and Jupyter Notebooks to conduct stream ripping and enable sports piracy using live streaming capture tools. The attacks involve the hijack of unauthenticated Jupyter Notebooks to establish initial access, and perform a series of actions designed ...
Read More »Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices
Ngioweb Botnet Fuels NSOCKS Residential Proxy Network Exploiting IoT Devices https://firewall.firm.in/wp-content/uploads/2024/11/botnet.png The malware known as Ngioweb has been used to fuel a notorious residential proxy service called NSOCKS, as well as by other services such as VN5Socks and Shopsocks5, new findings from Lumen Technologies reveal. “At least 80% of NSOCKS bots in our telemetry originate from the Ngioweb botnet, mainly ...
Read More »