تطبيقات ضارة لمتجر Play

Malicious Apps Use Sneaky Versioning Technique to Bypass Google Play Store Scanners

Threat actors are leveraging a technique called versioning to evade Google Play Store’s malware detections and target Android users. Malicious Play Store apps “Campaigns using versioning commonly target users’ credentials. data. and finances. ” Google Cybersecurity Action Team (GCAT) said in its August 2023 Threat Horizons Report shared with The Hacker News. While versioning is […]

ثغرة أمنية في PaperCut

Cybersecurity researchers have discovered a new high-risk vulnerability in the PaperCut

Cybersecurity researchers have discovered a new high-risk vulnerability in the PaperCut print management software for Windows that can lead to remote code execution under certain circumstances. PaperCut security vulnerability The vulnerability has been tracked as CVE-2023-39143 (CVSS Score: 8.4). And it affects PaperCut NG/MF prior to version 22.1.3. It has been described as a combination […]

Google add support for MLS

Google plans to add support for MLS to Messages.

Google plans to add support for MLS to Messages. Jules Hedges, Google’s privacy engineering director, said, “Most modern consumer messaging platforms. (including Google Messages) support end-to-end encryption, but users today are limited to communicating with contacts who use the same platform. That’s why Google strongly supports regulatory efforts that require interoperability for large messaging platforms […]

New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices.

A new campaign is targeting internet-facing Linux systems and IoT devices in order to mine cryptocurrency. The attackers use a backdoor that deploys a wide array of tools and components, such as rootkits and an IRC bot, to steal device resources for mining operations. New Cryptocurrency Mining Campaign Targets Linux Systems and IoT Devices. The […]

Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam.

A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years in prison in the U.S. Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam. Joseph James O’Connor (aka PlugwalkJoe), 24, was awarded the sentence on Friday in the Southern District of New […]

Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions

  Microsoft on Friday attributed a string of service outages aimed at Azure, Outlook, and OneDrive earlier this month to an uncategorized cluster it tracks under the name Storm-1359. Microsoft Blames Massive DDoS Attack for Azure, Outlook, and OneDrive Disruptions “These attacks likely rely on access to multiple virtual private servers (VPS) in conjunction with […]

Over 100,000 Stolen ChatGPT Account Credentials

Over 100,000 compromised OpenAI ChatGPT account credentials have found their way on illicit dark web marketplaces between June 2022 and May 2023, with India alone accounting for 12,632 stolen credentials. Over 100,000 Stolen ChatGPT Account Credentials Sold on Dark Web Marketplaces Credentials were discovered within information stealer logs made available for sale on the cybercrime […]

ASUS Releases Patches to Fix Critical Security

Taiwanese company ASUS on Monday released firmware updates to address. Among other issues, nine security bugs impacting a wide range of router models. ASUS Releases Patches to Fix Critical Security Bugs Impacting Multiple Router Models. Of the nine security flaws. Two are rated Critical and six are rated High in severity. One vulnerability is currently […]

Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency

Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets, new findings reveal. Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency “Cryptocurrency mining is a crucial part of our industry, but it also holds special appeal to bad actors, as it provides a means to […]

Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities

The threat actors behind the Vidar malware have made changes to their backend infrastructure, indicating attempts to retool and conceal their online trail in response to public disclosures about their modus operandi. Vidar Malware Using New Tactics to Evade Detection and Anonymize Activities “Vidar threat actors continue to rotate their backend IP infrastructure, favoring providers […]

Select your currency