MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited
A critical flaw in Progress Software’s in MOVEit Transfer managed file transfer application has come under widespread exploitation in the wild to take over vulnerable systems. The shortcoming, which is yet to be assigned a CVE identifier, relates to a severe SQL injection vulnerability that could lead to escalated privileges and potential unauthorized access to […]
Amazon’s Ring cameras were used to spy on customers
Every single Amazon Ring employee was able to access every single customer video, even when it wasn’t necessary for their jobs. Not only that, but the employees—along with workers from a third-party contractor in Ukraine—could also download any of those videos and then save and share them as they liked, before July 2017. That’s what the […]
US hospital forced to divert ambulances after cyberattack
The Idaho Falls Community Hospital fell victim to a cyberattack on Monday May 29, 2023. As a result, the hospital had to divert ambulances to other nearby hospitals and close some of its clinics. The hospital is keeping the public updated through its website and Facebook page. “Our commitment to our patients’ well-being continues to remain our top […]
Windows Users Beware: Crooks Relying on SeroXen RAT to Target Gamers
By Deeba Ahmed Currently, SeroXen RAT is delivered either via phishing emails or Discord channels. This is a post from HackRead.com Read the original post: Windows Users Beware: Crooks Relying on SeroXen RAT to Target Gamers
Utilizing the Economic Calendar: A Key to Enhancing Safety in Cryptocurrency Trading
By Owais Sultan As cryptocurrency continues to capture the attention of investors worldwide, it becomes increasingly vital to explore strategies that… This is a post from HackRead.com Read the original post: Utilizing the Economic Calendar: A Key to Enhancing Safety in Cryptocurrency Trading
How To Reduce Cost Overruns For AI Implementation Projects
By Owais Sultan AI implementations can be costly and drain their allotted budgets. Thankfully, you can learn how to reduce your… This is a post from HackRead.com Read the original post: How To Reduce Cost Overruns For AI Implementation Projects
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
An analysis of the “evasive and tenacious” malware known as QBot has revealed that 25% of its command-and-control (C2) servers are merely active for a single day. What’s more, 50% of the servers don’t remain active for more than a week, indicating the use of an adaptable and dynamic C2 infrastructure, Lumen Black Lotus Labs said […]
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign dubbed Operation Triangulation that began in 2019. “The targets are infected using zero-click exploits via the iMessage platform, and the malware runs with root privileges, gaining complete control over the device and user data,” Kaspersky said. The Russian
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin
Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime actor known as XE Group. According to Menlo Security, which pieced together the information from different online sources, “Nguyen Huu Tai, who also goes by the names Joe Nguyen and Thanh Nguyen, has the strongest likelihood of […]
Amazon fined $31 million over privacy breaches, including snooping on kids
By Habiba Rashid The case involves Amazon’s settlement with the FTC over security and privacy violations committed by its subsidiaries, Ring and Alexa. This is a post from HackRead.com Read the original post: Amazon fined $31 million over privacy breaches, including snooping on kids