Exposing a Currently Active Personally Identifiable Cybercriminals XMPP/Jabber Account IDs Portfolio – Part Three

Folks,This is the third part of the blog posts series where I’m actively data mining publicly and private invite only cybercrime-friendly communities looking for personally identifiable email address accounts and XMPP/Jabber account IDs with the idea t… Continue reading Exposing a Currently Active Personally Identifiable Cybercriminals XMPP/Jabber Account IDs Portfolio – Part Three

Posted in Uncategorized

Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution

Juniper Networks has released Junos OS updates to address J-Web vulnerabilities that can be combined to achieve unauthenticated, remote code execution.
The post Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution appeared f… Continue reading Flaws in Juniper Switches and Firewalls Can Be Chained for Remote Code Execution

This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit nodes to reroute proxy requests.
According to AT&T Alien Labs, the unnamed company that offers the proxy servi… Continue reading This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers

Posted in Uncategorized

Learn About Business Accounting and Taxes for Just $30

With 15 courses in this e-learning bundle, you could study tax prep, QuickBooks, and more, all at your own pace with complete lifetime access. Continue reading Learn About Business Accounting and Taxes for Just $30