“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
FBI Busts Rydox Marketplace with 7,600 PII Sales, Cryptocurrency Worth $225K Seized [email protected] (The Hacker News)
The U.S. Department of Justice (DoJ) on Thursday announced the shutdown of an illicit marketplace called Rydox (“rydox.ru” and “rydox[.]cc”) for selling stolen personal information, access devices, and other tools for conducting cybercrime and fraud. In tandem, three Kosovo nationals and administrators of the service, Ardit Kutleshi, Jetmir Kutleshi, and Shpend Sokoli, have been arrested.…
-
Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online [email protected] (The Hacker News)
Cybersecurity researchers are warning that thousands of servers hosting the Prometheus monitoring and alerting toolkit are at risk of information leakage and exposure to denial-of-service (DoS) as well as remote code execution (RCE) attacks. “Prometheus servers or exporters, often lacking proper authentication, allowed attackers to easily gather sensitive information, such as credentials and APIRead More
-
Cleo patches file transfer zero-day flaw under attack
Post ContentRead More
-
Gamaredon Deploys Android Spyware “BoneSpy” and “PlainGnome” in Former Soviet States [email protected] (The Hacker News)
The Russia-linked state-sponsored threat actor tracked as Gamaredon has been attributed to two new Android spyware tools called BoneSpy and PlainGnome, marking the first time the adversary has been discovered using mobile-only malware families in its attack campaigns. “BoneSpy and PlainGnome target former Soviet states and focus on Russian-speaking victims,” Lookout said in an analysis.…
-
What’s the difference between jailbreaking and rooting?
Post ContentRead More
-
Researchers Uncover Symlink Exploit Allowing TCC Bypass in iOS and macOS [email protected] (The Hacker News)
Details have emerged about a now-patched security vulnerability in Apple’s iOS and macOS that, if successfully exploited, could sidestep the Transparency, Consent, and Control (TCC) framework and result in unauthorized access to sensitive information. The flaw, tracked as CVE-2024-44131 (CVSS score: 5.3), resides in the FileProvider component, per Apple, and has been addressed with improvedRead…
-
9 identity and access management trends to watch in 2025
Post ContentRead More
-
SaaS Budget Planning Guide for IT Professionals [email protected] (The Hacker News)
SaaS services are one of the biggest drivers of OpEx (operating expenses) for modern businesses. With Gartner projecting $247.2 billion in global SaaS spending this year, it’s no wonder SaaS budgets are a big deal in the world of finance and IT. Efficient SaaS utilization can significantly affect both the bottom line and employee productivity. …
-
7 must-know IAM standards in 2025
Post ContentRead More
-
WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins [email protected] (The Hacker News)
Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, tracked as CVE-2024-11972 (CVSS score: 9.8), affects all versions of the plugin prior to 1.9.0. The plugin has over 10,000 active installations. “This flaw…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova