intelligence gathering
-
Hackers' ransom demand was rejected, and confidential British police data leaked on the dark web
The Clop gang has revealed a new victim company on its data breach site on the dark web, Dacoll Limited, an ICT managed services, network infrastructure and electrical contracting provider that has access to police state computing...
-
The Apache Log4j2 component was once again exposed to a high-risk vulnerability, denial of service (CVE-2021-45105)
1. Vulnerability description log4j is an open source log component implemented by apache. Logback is also designed by the author of log4j. It has better features and is a log framework used to replace log4j. It is the native implementation of slf4j...
-
Improper Apache Kafka cluster configuration and sensitive data leakage
Kafdrop is an open source web UI visual management interface for Apache Kafka. It is an open source cloud native platform for collecting, analyzing, storing and managing data flows. Kafka is widely used in finance, big data analysis and large-scale mutual...
-
US State Department and diplomats' iPhones suspected of being hacked by spyware
Apple notified several U.S. Embassy and State Department employees that their iPhones may have been targeted by an unidentified attacker using a security code developed by the controversial Israeli company NSO, Reuters and the Washington Post reported. Grou…
-
More than 300,000 devices will be attacked by 4 Android Trojans in 2021
Between August and November 2021, four different Android Trojans spread through the official Google Play Store, resulting in the infection of more than 300,000 apps disguised as seemingly...
-
Panasonic file server data leaked
Panasonic recently discovered that it had suffered a data breach that allowed attackers to access its file servers and steal data, the company announced late last week. The technology company said its network was breached on November 11, 2021, with "some...
-
Taiwan's securities firm with a market value of 100 billion was attacked by hackers. Users automatically bought Hong Kong stocks and suffered instant losses.
Recently, according to multiple Taiwanese media reports, the trading systems of many securities firms, including Yuanta Securities, Taiwan’s leading securities firm, are suspected to have been subject to “credential stuffing attacks” by hackers. A large number of customers’ securities accounts were automatically “placed” and batched Buy Hong Kong stocks. Among them, there are even investor accounts that passively buy...
-
Could zero trust be the answer to the ransomware threat?
Zero Trust is the latest buzzword being thrown around by security vendors, consultants and policymakers as a panacea to all cybersecurity problems, and some 42% global organizations say they already have plans to adopt Zero Trust. The Biden administration also outlined federal network and systems acquisition...
-
Israel bans sales of hacking tools to 65 countries
Israel's Defense Ministry has sharply restricted the number of countries to which its cybersecurity companies can sell offensive hacking and surveillance tools, with 65 countries removed from the export list. Details of the revised list were first reported by Israeli business newspaper Calcalist…
-
Research discovers a new stealth JavaScript loader that uses malware to infect computers
Research found that the attackers used a previously undocumented JavaScript malware that served as a loader to distribute a series of remote access Trojans (RATs) and information-stealing programs. HP Threat Research reports this new evasion...