Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm

Databases of sensitive, financial and personally identifiable info and documents from Intcomex were leaked on Russian-language hacker forum after a ransomware attack. Continue reading Cybercriminals Steal Nearly 1TB of Data from Miami-Based International Tech Firm

Office 365: A Favorite for Cyberattack Persistence

Bad actors are leveraging legitimate services and tools within Microsoft’s productivity suite to launch cyberattacks on COVID-19 stay-at-home workers, new research finds. Continue reading Office 365: A Favorite for Cyberattack Persistence

Wormable Apple iCloud Bug Allows Automatic Photo Theft

Ethical hackers so far have earned nearly $300K in payouts from the Apple bug-bounty program for discovering 55 bugs, 11 of them critical, during a three-month hack. Continue reading Wormable Apple iCloud Bug Allows Automatic Photo Theft

Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

A spike in phishing and malicious websites aimed at defrauding Amazon.com customers aim to make Prime Day a field day for hackers. Continue reading Amazon Prime Day Spurs Spike in Phishing, Fraud Attacks

PoetRAT Resurfaces in Attacks in Azerbaijan Amid Escalating Conflict

Spear-phishing attacks targeting VIPs and others show key malware changes and are likely linked to the current conflict with Armenia. Continue reading PoetRAT Resurfaces in Attacks in Azerbaijan Amid Escalating Conflict

APT Attack Injects Malware into Windows Error Reporting

The fileless attack uses a phishing campaign that lures victims with information about a worker’s compensation claim. Continue reading APT Attack Injects Malware into Windows Error Reporting

Bluetooth Spoofing Bug Affects Billions of IoT Devices

The ‘BLESA’ flaw affects the reconnection process that occurs when a device moves back into range after losing or dropping its pairing, Purdue researchers said. Continue reading Bluetooth Spoofing Bug Affects Billions of IoT Devices

MFA Bypass Bugs Opened Microsoft 365 to Attack

Vulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio. Continue reading MFA Bypass Bugs Opened Microsoft 365 to Attack