Headlines
How Cybercriminals Exploit 404 Pages to Steal Sensitive Informationwordpress,cybercrime,404pages,datatheft,cybersecurity,websitesecurity

How Cybercriminals Exploit 404 Pages to Steal Sensitive Information

The Evolving Tactics of Cybercriminal Groups Behind Magecart Attacks An Unseen Technique to Hide Credit Card Skimming Code Recently, the notorious cybercriminal groups responsible for the Magecart payment-card theft campaigns have employed a new technique to conceal their credit card skimming code. This technique has allowed them to evade detection for several weeks while infecting…

Read More
Data Thieves Exploit New Certificate Abuse Tacticwordpress,cybersecurity,datatheft,certificateabuse,hacking,onlinesecurity

Data Thieves Exploit New Certificate Abuse Tactic

New Type of Certificate Abuse Used to Spread Info-Stealing Malware Introduction In recent months, cyber attackers have been employing a new tactic known as certificate abuse to spread info-stealing malware, with a particular focus on stealing credentials and sensitive data. This campaign utilizes search engine optimization (SEO) poisoning to manipulate search results and redirect users…

Read More
Vietnamese Hackers Utilize Python-Based Stealer to Target Facebook Messenger Userspython-basedstealer,vietnamesehackers,facebookmessenger,cybersecurity,hacking,datatheft

Vietnamese Hackers Utilize Python-Based Stealer to Target Facebook Messenger Users

Mac Security Survey 2023 Reveals Insights into Cybersecurity Myths and Online Behavior Inconsistencies of Mac Users Introduction In a rapidly digitizing world, cybersecurity has become paramount for individuals and organizations alike. Mac users, often touted for their devices’ robust security features, are not exempt from the threats posed by cybercriminals. A recent Mac Security Survey…

Read More
The OpenNMS Bug: Urgent Patch Required to Protect Against Data Theft and Denial of Service Attacksopennms,bug,patch,datatheft,denialofserviceattacks

The OpenNMS Bug: Urgent Patch Required to Protect Against Data Theft and Denial of Service Attacks

High-Severity Vulnerability Patched in OpenNMS: A Cause for Concern Introduction OpenNMS, a widely used open source network monitoring software, recently faced a high-severity vulnerability. The XML external entity (XXE) injection vulnerability allowed attackers to exfiltrate data, trigger denial-of-service conditions, and send arbitrary HTTP requests to internal and external services. This vulnerability affected both the community-supported…

Read More
Points.com: Unveiling the Vulnerabilities Behind Customer Data Theft and Rewards Program Hackingwordpress,cybersecurity,datatheft,rewardsprogramhacking,vulnerabilities

Points.com: Unveiling the Vulnerabilities Behind Customer Data Theft and Rewards Program Hacking

Vulnerabilities in points.com Exposed Customer Data Theft and Rewards Program Hacking Introduction Multiple vulnerabilities in the popular airline and hotel rewards platform, points.com, have been identified by security researchers. These vulnerabilities could have allowed attackers to access users’ personal information, transfer points between accounts, and gain unauthorized administrative access. The security team at points.com has…

Read More
Rilide Data Theft Malware: Adapting to Chrome Extension Manifest V3wordpress,malware,datatheft,Rilide,ChromeExtensionManifestV3

Rilide Data Theft Malware: Adapting to Chrome Extension Manifest V3

Securing Sensitive Accounts: Learn PAM Security Strategies The Importance of PAM Security In today’s digital landscape, the security of our online accounts is of paramount importance. With cyber threats becoming increasingly sophisticated, it is essential that individuals and organizations take proactive measures to safeguard sensitive information. Privileged Access Management (PAM) security strategies play a vital…

Read More
Parsing the Power: Unveiling the CPU's Achilles' Heel in Data Theftwordpress,CPU,datatheft,parsing,power,vulnerability,security

Parsing the Power: Unveiling the CPU’s Achilles’ Heel in Data Theft

New CPU Security Loophole: Analysis of Energy Consumption Allows Data Theft Introduction In a significant breakthrough, researchers at Graz University of Technology and the Helmholtz Center for Information Security have uncovered a new security vulnerability that affects all common main processors (CPUs) in computers. This vulnerability, known as “Collide+Power,” exploits the energy consumption patterns of…

Read More
The Rise of CherryBlos: How OCR Technology is Being Exploited to Steal Android Users' Cryptocurrencywordpress,OCRtechnology,CherryBlos,Android,cryptocurrency,cybersecurity,mobilesecurity,datatheft,digitalcurrency,mobileapps

The Rise of CherryBlos: How OCR Technology is Being Exploited to Steal Android Users’ Cryptocurrency

CherryBlos and FakeTrade: New Malware Campaigns Targeting Android Users for Cryptocurrency Theft and Financial Scams Introduction In the realm of cybersecurity, Android users have become the latest target for malware campaigns seeking to steal cryptocurrency and perpetrate fraudulent financial activities. Two related malware campaigns, known as CherryBlos and FakeTrade, have recently come to the attention…

Read More
Rogue Azure AD Guests: A Looming Data Theft Threat through Power Appswordpress,AzureAD,datatheft,PowerApps,security,guestusers

Rogue Azure AD Guests: A Looming Data Theft Threat through Power Apps

Guest Accounts in Azure AD: Unintended Consequences and Data Security The Potential for Oversharing Access to Sensitive Resources Guest accounts in Azure Active Directory (AAD) have long been seen as a means of enabling collaboration with external third parties, while minimizing exposure to sensitive corporate resources. However, recent research by Michael Bargury, CTO of Zenity,…

Read More
QuickBlox API Vulnerabilities Expose Video and Chat Users to Data Theftwordpress,QuickBlox,APIvulnerabilities,datatheft,video,chat

QuickBlox API Vulnerabilities Expose Video and Chat Users to Data Theft

Millions at Risk: Critical Vulnerabilities Found in QuickBlox‘s API QuickBlox, a widely-used chat and video calling platform across various industries, has been discovered to have critical vulnerabilities that could potentially expose the personal data of millions of users. In an extensive investigation conducted by Team 82 and Check Point Research, several flaws were found in…

Read More