How to Create an Accessible Website and Why It Matters
By Owais Sultan Have you ever tried to access a website only to find that it’s difficult or impossible to navigate?… This is a post from HackRead.com Read the original post: How to Create an Accessible Website and Why It Matters
Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted
By Waqas Initially, reports suggested that only radio messages were affected. However, subsequent investigations and recordings revealed that the fraudulent messages were also displayed on television screens. This is a post from HackRead.com Read the original post: Deepfake Cyber Attack Hits Russia: Fake Putin Message Broadcasted
Global Malware Attack Imitates VPN & Security Apps on Android Phones
By Habiba Rashid The massive and sophisticated mobile malware campaign has been operating undetected on Android devices across the globe for more than six months. This is a post from HackRead.com Read the original post: Global Malware Attack Imitates VPN & Security Apps on Android Phones
Sweat Economy Gives Power to Community over 2 Billion SWEAT Tokens
By Waqas These 2 billion SWEAT tokens, which make up around 13% of the total supply, have been locked in… This is a post from HackRead.com Read the original post: Sweat Economy Gives Power to Community over 2 Billion SWEAT Tokens
Microsoft to Pay $20 Million Penalty for Illegally Collecting Kids’ Data on Xbox
Microsoft has agreed to pay a penalty of $20 million to settle U.S. Federal Trade Commission (FTC) charges that the company illegally collected and retained the data of children who signed up to use its Xbox video game console without their parents’ knowledge or consent. “Our proposed order makes it easier for parents to protect […]
Winning the Mind Game: The Role of the Ransomware Negotiator
Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed them. The Ransomware Industry Ransomware is an industry. As such, it has its own business logic: organizations pay money, in crypto-currency, in order to regain control over their systems and data. This industry’s landscape is […]
How can small businesses ensure Cybersecurity?
The content of this post is solely the responsibility of the author. AT&T does not adopt or endorse any of the views, positions, or information provided by the author in this article. Small businesses are more vulnerable to cyber-attacks since hackers view them as easy victims to target. While this may seem unlikely, statistics reveal […]
New PowerDrop Malware Targeting U.S. Aerospace Industry
An unknown threat actor has been observed targeting the U.S. aerospace industry with a new PowerShell-based malware called PowerDrop. “PowerDrop uses advanced techniques to evade detection such as deception, encoding, and encryption,” according to Adlumin, which found the malware implanted in an unnamed domestic aerospace defense contractor in May 2023. “The name is derived from the tool,
Cl0p ransomware gang claims first victims of the MOVEit vulnerability
On Friday June 2, 2023 we reported about a MOVEit Transfer vulnerability that was actively being exploited. If your organization uses MOVEit Transfer and you haven’t patched yet, it really is time to move it. Excuse the bad pun, but yesterday we saw the first victims of this vulnerability come forward. MOVEit Transfer is a […]
New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency
A recent malware campaign has been found to leverage Satacom downloader as a conduit to deploy stealthy malware capable of siphoning cryptocurrency using a rogue extension for Chromium-based browsers. “The main purpose of the malware that is dropped by the Satacom downloader is to steal BTC from the victim’s account by performing web injections into targeted cryptocurrency […]