Menu

Blog

Archive for the ‘cybercrime/malcode’ category: Page 79

Jul 29, 2022

How governments seize millions in stolen cryptocurrency

Posted by in categories: cryptocurrencies, cybercrime/malcode, government

Cryptocurrency hacks are increasing. Here’s how the government tries to track, freeze, and seize the stolen money before it disappears out of reach.

Jul 29, 2022

Cyber-Criminal Offers 5.4m Twitter Users’ Data

Posted by in category: cybercrime/malcode

A database containing 5.4m Twitter users’ data is reportedly for sale on a popular criminal forum. Twitter is investigating the issue, which the seller said exploited a vulnerability in its systems reported in January.

The seller, using the nickname ‘devil,’ advertised the data on the Breached Forums site and demanded at least $30,000 for it. They said that the database contains the phone numbers and email addresses of users, including celebrities and companies.

The hack reportedly exploits a vulnerability first reported by a HackerOne user known as ‘zhirinovskiy.’ That bug enabled “an attacker with a basic knowledge of scripting/coding” to find a Twitter user’s phone number and email address, even if the user has hidden them in privacy settings. The attacker explained how to exploit the bug in their HackerOne report. Twitter acknowledged the bug and fixed it five days later.

Jul 28, 2022

Neuroengineers hack fruit fly brain and remotely control its movements

Posted by in categories: bioengineering, cybercrime/malcode, genetics, nanotechnology, neuroscience

A research team led by Rice University neuroengineers has created wireless technology to remotely activate specific brain circuits in fruit flies in under one second.

The team – an assemblage of experts in genetic engineering, nanotechnology, and electrical engineering – used magnetic signals to activate targeted neurons that controlled the body position of freely moving fruit flies in an enclosure.

Continue reading “Neuroengineers hack fruit fly brain and remotely control its movements” »

Jul 28, 2022

Flag and anthem of Human empire

Posted by in categories: cybercrime/malcode, policy, transportation

- IMAGINARY
ANTHEM: “Anthem of the Human empire“
same tune as “The Flag Parade” by John Williams from Star Wars Episode I

- MODERATION POLICY
1) Keep comments civil.
2) Ideological and political comments are not allowed.
3) Comment section under explicit political videos will be deactivated. Same with old toxic comment sections.
4) Comments under video with mild political implications will be reviewed first.
5) SPAM = BAN
6) Warning at first infraction, recidivists will be blocked.
7) Serious offenders will be blocked with no warning.
8) Insult me and you will be blocked with no warning.
9) “Satire” is not an excuse made using Flag 3D screensaver, available here:
http://www.3planesoft.com/holidays-screensavers/flag-3d-screensaver/

Continue reading “Flag and anthem of Human empire” »

Jul 28, 2022

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware

Posted by in categories: business, cybercrime/malcode

Researchers have discovered a new infostealer malware, dubbed DUCKTAIL, targeting individuals and organizations that operate on Facebook’s Business.

Jul 28, 2022

New Ducktail Infostealer Malware Targeting Facebook Business and Ad Accounts

Posted by in categories: business, cybercrime/malcode

Researchers have discovered a new infostealer malware, dubbed DUCKTAIL, targeting individuals and organizations that operate on Facebook’s Business.

Jul 27, 2022

MIT system can fix your software bugs on its own (by borrowing from other software)

Posted by in categories: biotech/medical, cybercrime/malcode, genetics, robotics/AI

Circa 2015


New software being developed at MIT is proving able to autonomously repair software bugs by borrowing from other programs and across different programming languages, without requiring access to the source code. This could save developers thousands of hours of programming time and lead to much more stable software.

Bugs are the bane of the software developer’s life. The changes that must be made to fix them are often trivial, typically involving changing only a few lines of code, but the process of identifying exactly which lines need to be fixed can be a very time-consuming and often very frustrating process, particularly in larger projects.

Continue reading “MIT system can fix your software bugs on its own (by borrowing from other software)” »

Jul 27, 2022

Cybersecurity firms expose the role of Israeli-made spyware in attack on journalists

Posted by in category: cybercrime/malcode

An Israel-based company was exposed for employing a malware that exploited a vulnerability in Google’s search engine to access the personal data of co.


Cybersecurity researchers were able to link a zero-day vulnerability in Google’s search engine to a US-sanctioned Israeli spyware company that targets journalists throughout West Asia.

On 21 July, cybersecurity company Avast reported that the Israeli spyware company, Candiru, was behind the DevilsTongue malware that has targeted dozens of journalists in Lebanon, Turkey, Yemen, and Palestine.

Continue reading “Cybersecurity firms expose the role of Israeli-made spyware in attack on journalists” »

Jul 27, 2022

LinkedIn phishing target employees managing Facebook Ad Accounts

Posted by in categories: business, cybercrime/malcode

A new phishing campaign codenamed ‘Ducktail’ is underway, targeting professionals on LinkedIn to take over Facebook business accounts that manage advertising for the company.

The operators of Ducktail have a narrow targeting scope and select their victims carefully, trying to find people who have admin privileges on their employer’s social media accounts.

The discovery of this campaign comes from researchers at WithSecure, who have been tracking what they believe to be a Vietnamese threat actor since 2021, and collected evidence of activity dating going back to 2018.

Jul 26, 2022

Windows enables default account lockout policy for RDP (Remote Desktop Protocol) to reduce ransomware attacks based on brute forcing RDP

Posted by in categories: cybercrime/malcode, policy

Microsoft has chosen to add specific security measures against brute force attacks against RDP (Remote Desktop Protocol). These security improvements have been introduced in the most recent builds of Windows 11. Given the evolution of this type of attack abusing RDP, Microsoft decided to add the security measure in the latest Insider Preview22528.1000. This system automatically locks accounts for 10 minutes after 10 invalid login attempts. The news was broken by David Weston (VP of OS & Enterprise Security) on Twitter last week.

These kinds of attacks against RDP are quite common in human operated ransomware. With this relatively simple measure, it is possible to complicate brute force attacks, being quite effective in discouraging them. However, it was already possible to activate this measure in Windows 10, so the novelty is really enabling it by default.

Continue reading “Windows enables default account lockout policy for RDP (Remote Desktop Protocol) to reduce ransomware attacks based on brute forcing RDP” »

Page 79 of 220First7677787980818283Last