Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Attackers are increasingly targeting insecure legacy protocols, like IMAP, to avoid running into multi-factor authentication in password-spraying campaigns. Continue reading Threatlist: IMAP-Based Attacks Compromising Accounts at ‘Unprecedented Scale’

Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Security researchers have uncovered a new botnet targeting Linux-based devices that’s more sophisticated than Mirai and most other IoT botnets observed so far. Researchers from antivirus vendor Avast have dubbed the new botnet Torii because its … Continue reading Sophisticated IoT Botnet Torii Uses 6 Persistence Methods

Dark Market Shop Sells RDP Access to Airport System for $10

Stolen or brute-forced remote desktop protocol (RDP) credentials have played a central role in many data breaches over the years and cybercriminals have made a business out of selling them on the underground market. For as little as $3, hackers can bu… Continue reading Dark Market Shop Sells RDP Access to Airport System for $10

Hacker Puts Airport’s Security System Access On Dark Web Sale For Just $10

If you can’t find it on Google, you will definitely find it on the Dark Web.

Black markets on the Dark web are not known for just buying drugs, it is a massive hidden network where you can buy pretty much anything you can imagine—from pornography, wea… Continue reading Hacker Puts Airport’s Security System Access On Dark Web Sale For Just $10

UK Parliament Hit by Cyberattack, Up to 90 MPs’ E-mail Accounts Hacked

A cyber attack has hit the email system of UK Houses of Parliament on Friday morning that breached at least 90 emails accounts protected by weak passwords belonging to MPs, lawmakers, and other parliamentary staff.

Meanwhile, as a precaution, the Secu… Continue reading UK Parliament Hit by Cyberattack, Up to 90 MPs’ E-mail Accounts Hacked