Anonymous Sudan has Reportedly paused their Cyber attacks Due to the broken internet in Sudan
Recently today Anonymous Sudan group has shared post in their Telegram group that they have temporarily paused their cyber attacks due to the shortage of Internet connection at the moment in Sudan. Any how all organizations which were declared to be the target are recommended to stay alerted and vigilant . Also recommending […]
Microsoft vs Google spat sees users rolling back security updates to fix browser issues
We like to imagine we’re in total control of our desktop experience, carefully curated to look and work the way we want it to. However, every so often a story comes along which reminds us how little control we have when the big players notice one another’s existence. A recent Windows update really wants you […]
Google and Apple cooperate to address unwanted tracking
Google and Apple have announced that they are looking for input from industry participants and advocacy groups on a draft specification to alert users in the event of suspected unwanted tracking. Samsung, Tile, Chipolo, eufy Security, and Pebblebee have stated that they will support the specification in future products. The specification will consist of a […]
Anonymous Sudan Hacktivist conducted DDOS attack against multiple organizations in UAE
‘ Article by -LinkCyb Admin- 06 May 2023 On or around May 5, 2023, the pro-Russian hacktivist group “Killnet” published a fresh list of DDoS victims on Telegram. The group listed 16 domains as victims. Killnet frequently includes evidence of the disruption in these posts in the form of a Check-host page with the victims’ […]
Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity to its attacks by adopting a novel DLL side-loading mechanism. “The attack is based on a classic side-loading attack, consisting of a clean application, a malicious loader, and an encrypted payload, with various modifications made to these components over time,” Sophos […]
New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks
Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a security flaw. The issue, assigned the identifier CVE-2023-30777, relates to a case of reflected cross-site scripting (XSS) that could be abused to inject arbitrary executable scripts into otherwise benign websites. The plugin, which is available […]
Apple releases first Rapid Security Response update for iOS, iPadOS, and macOS users
On Monday, Apple released its first batch of Rapid Security Response (RSR) patches, iOS 16.4.1 (a), iPadOS 16.4.1 (a), and macOS 13.3.1 (a), for iPhone and iPad, and macOS devices, respectively. RSR is a new type of software patch delivered between Apple’s regular, scheduled software updates. Previously, Apple security fixes came bundled along with features and improvements, but […]
Newspaper evades Russian censors, hides news in Counter-Strike map
A Finnish newspaper is making clever use of popular video game titles to promote press freedom and bypass Russian media restrictions regarding the invasion of Ukraine. The plan: Hide a secret room underneath a map, which players can stumble upon and see facts, figures, and photographs of what’s been going on. The map is a custom […]
Transferring WhatsApp Data Between Android and iPhone [2023]
By ghostadmin When you transfer data from an Android to an iOS device, the Move to an iOS app is… This is a post from HackRead.com Read the original post: Transferring WhatsApp Data Between Android and iPhone [2023]
New Android Malware ‘FluHorse’ Targeting East Asian Markets with Deceptive Tactics
Various sectors in East Asian markets have been subjected to a new email phishing campaign that distributes a previously undocumented strain of Android malware called FluHorse that abuses the Flutter software development framework. “The malware features several malicious Android applications that mimic legitimate applications, most of which have more than 1,000,000 installs,” Check Point said in