A Guide to Cryptocurrency Payment Gateways
In the landscape of global commerce, cryptocurrency has rapidly ascended from a niche interest to a significant player in financial transactions. Its growth has been propelled by the appeal of decentralized finance and the...
Multiple Videolan VLC Player Flaws Leads to Memory Corruption: Update Now!
Recently, two significant vulnerabilities related to memory corruption have been uncovered in the popular VLC media player.
These vulnerabilities were found in the Microsoft Media Server (MMS), which has two implementations in VLC: MMS...
Hackers Weaponize PDF Files to Deliver Multiple Ransomware Variants
PDF files are commonly used for their versatility, making them a prime target for malware delivery because they can embed malicious scripts or links.
Their widespread use and trusted reputation make users more susceptible to...
Chinese Hackers Expanding Capabilities to Exploit Zero-Day Flaws
State-sponsored hackers or threat actors and their cyber operations are evolving at an alarming pace, leveraging advanced techniques and constantly adapting to exploit emerging vulnerabilities.
The intersection of technology and geopolitics fuels a relentless race,...
4,076,530 Systems Hacked Using Gaming-related Cyber Attacks
As the gaming industry grows in income and player base, cybercriminals find it an attractive target. Anticipated and already well-known games are frequently utilized as a lure in malicious campaigns.
As of 2022, around 25%...
Hilb Group Cyber Attack: 81K people’s Personal Information Exposed
The Hilb Group Operating Company, LLC, a Maryland-based company, has disclosed a major data breach that has affected 81,539 individuals, including 105 Maine residents.
The breach, which took place from December 1, 2022, to January...
U.S. Government Recovers $2.4 Million From A Business Emails Hack
In a recent cyber attack, hackers managed to fraudulently obtain $2.4 million through compromised business emails. However, thanks to the swift action of the U.S. Government, the stolen funds were successfully reclaimed and returned...
Okta Employee’s Use of Personal Google Account Leads to Security Breach
Okta, the US-based IT Service Management Company, acknowledges that the breach of the employee's personal Google account or personal device is the most likely channel for exposure of the credential during the recent hack...
HelloKitty Ransomware Exploiting Apache ActiveMQ Flaw
The recently disclosed Apache ActiveMQ remote code execution (RCE) flaw, CVE-2023-46604 is being exploited to spread ransomware binaries on target systems and demand a ransom from the victim organizations.
Based on the evidence and the ransom note, Rapid7...
Hackers Spreading WhatsApp Spy Mods Via Telegram
WhatsApp does not officially support WhatsApp mods and can vary in popularity. Some users are attracted to them for extra features and customization options.
However, using WhatsApp mods can expose users to security risks, as...