“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
What is cyberstalking and how to prevent it?
Post ContentRead More
-
Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries [email protected] (The Hacker News)
Brazil, South Africa, Indonesia, Argentina, and Thailand have become the targets of a campaign that has infected Android TV devices with a botnet malware dubbed Vo1d. The improved variant of Vo1d has been found to encompass 800,000 daily active IP addresses, with the botnet scaling a peak of 1,590,299 on January 19, 2025, spanning 226…
-
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language [email protected] (The Hacker News)
Firefox browser maker Mozilla on Friday updated its Terms of Use a second time within a week following criticism overbroad language that appeared to give the company the rights to all information uploaded by users. The revised Terms of Use now states – You give Mozilla the rights necessary to operate Firefox. This includes processing…
-
Amnesty Finds Cellebrite’s Zero-Day Used to Unlock Serbian Activist’s Android Phone [email protected] (The Hacker News)
A 23-year-old Serbian youth activist had their Android phone targeted by a zero-day exploit developed by Cellebrite to unlock the device, according to a new report from Amnesty International. “The Android phone of one student protester was exploited and unlocked by a sophisticated zero-day exploit chain targeting Android USB drivers, developed by Cellebrite,” the international…
-
RDP: a Double-Edged Sword for IT Teams – Essential Yet Exploitable [email protected] (The Hacker News)
Remote Desktop Protocol (RDP) is an amazing technology developed by Microsoft that lets you access and control another computer over a network. It’s like having your office computer with you wherever you go. For businesses, this means IT staff can manage systems remotely, and employees can work from home or anywhere, making RDP a true…
-
5,000 Phishing PDFs on 260 Domains Distribute Lumma Stealer via Fake CAPTCHAs [email protected] (The Hacker News)
Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA images shared via PDF documents hosted on Webflow’s content delivery network (CDN) to deliver the Lumma stealer malware. Netskope Threat Labs said it discovered 260 unique domains hosting 5,000 phishing PDF files that redirect victims to malicious websites. “The attacker uses SEO to…
-
Microsoft targets AI deepfake cybercrime network in lawsuit
Post ContentRead More
-
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme [email protected] (The Hacker News)
Microsoft on Thursday unmasked four of the individuals that it said were behind an Azure Abuse Enterprise scheme that involves leveraging unauthorized access to generative artificial intelligence (GenAI) services in order to produce offensive and harmful content. The campaign, called LLMjacking, has targeted various AI offerings, including Microsoft’s Azure OpenAI Service. The tech giant isRead…
-
12,000+ API Keys and Passwords Found in Public Datasets Used for LLM Training [email protected] (The Hacker News)
A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices…
-
Sticky Werewolf Uses Undocumented Implant to Deploy Lumma Stealer in Russia and Belarus [email protected] (The Hacker News)
The threat actor known as Sticky Werewolf has been linked to targeted attacks primarily in Russia and Belarus with the aim of delivering the Lumma Stealer malware by means of a previously undocumented implant. Cybersecurity company Kaspersky is tracking the activity under the name Angry Likho, which it said bears a “strong resemblance” to Awaken…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova