Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them

Malicious actors can gain unauthorized access to users’ online accounts via a new technique called “account pre-hijacking,” latest research has found.
The attack takes aim at the account creation process that’s ubiquitous in websites and other online … Continue reading Learn How Hackers Can Hijack Your Online Accounts Even Before You Create Them

Posted in Uncategorized

New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

Popular video conferencing service Zoom hasĀ resolvedĀ as many as four security vulnerabilities, which could be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages and ex… Continue reading New Zoom Flaws Could Let Attackers Hack Victims Just by Sending them a Message

Posted in Uncategorized

Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Two trojanized Python and PHP packages have been uncovered in what’s yet another instance of a software supply chain attack targeting the open source ecosystem.
One of the packages in question is “ctx,” a Python module available in the PyPi repository… Continue reading Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Posted in Uncategorized

Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Threat actors behind web skimming campaigns are leveraging malicious JavaScript code that mimics Google Analytics and Meta Pixel scripts in an attempt to sidestep detection.
“It’s a shift from earlier tactics where attackers conspicuously injected mal… Continue reading Microsoft Warns of Web Skimmers Mimicking Google Analytics and Meta Pixel Code

Posted in Uncategorized

Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

Fronton, a distributed denial-of-service (DDoS) botnet that came to light in March 2020, is much more powerful than previously thought, per the latest research.
“Fronton is a system developed for coordinated inauthentic behavior on a massive scale,” t… Continue reading Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns

Posted in Uncategorized

Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

At least two research institutes located in Russia and a third likely target in Belarus have been at the receiving end of an espionage attack by a Chinese nation-state advanced persistent threat (APT).
The attacks, codenamed “Twisted Panda,” come in t… Continue reading Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes

Posted in Uncategorized