fbpx

Hacking

1M Stolen Credit Cards Hit Dark Web for Free

1M Stolen Credit Cards Hit Dark Web for Free

Threat actors have leaked 1 million stolen credit cards for free online as a way to promote a fairly new and increasingly popular cybercriminal site dedicated to…selling payment-card credentials. Researchers from threat intelligence firm Cyble noticed the leak of the payment-card data during a “routine monitoring of cybercrime and Dark Web marketplaces,” researchers said in …

1M Stolen Credit Cards Hit Dark Web for Free Read More »

Actively exploited bug bypasses authentication on millions of routers

Actively exploited bug bypasses authentication on millions of routers

Threat actors actively exploit a critical authentication bypass vulnerability impacting home routers with Arcadyan firmware to take them over and deploy Mirai botnet malicious payloads. The vulnerability tracked as CVE-2021-20090 is a critical path traversal vulnerability (rated 9.9/10) in the web interfaces of routers with Arcadyan firmware that could allow unauthenticated remote attackers to bypass authentication. The ongoing attacks were …

Actively exploited bug bypasses authentication on millions of routers Read More »

Cisco Issues Critical Security Patches to Fix Small Business VPN Router Bugs

Cisco Issues Critical Security Patches to Fix Small Business VPN Router Bugs

Cisco Issues Networking equipment major Cisco has rolled out patches to address critical vulnerabilities impacting its Small Business VPN routers that could be abused by a remote attacker to execute arbitrary code and even cause a denial-of-service (DoS) condition. The issues tracked as CVE-2021-1609 (CVSS score: 9.8) and CVE-2021-1610 (CVSS score: 7.2), reside in the …

Cisco Issues Critical Security Patches to Fix Small Business VPN Router Bugs Read More »

Chinese Hackers Target Major Southeast Asian Telecom Companies

Chinese Hackers Target Major Southeast Asian Telecom Companies

Three distinct clusters of malicious activities operating on behalf of Chinese state interests have staged a series of attacks to target networks belonging to at least five major telecommunications companies located in Southeast Asian countries since 2017. “The goal of the attackers behind these intrusions was to gain and maintain continuous access to telecommunication providers …

Chinese Hackers Target Major Southeast Asian Telecom Companies Read More »

Google is going to block logins on old Android devices starting September

Google is going to block logins on old Android devices starting September

Google is emailing Android users to let them know that, starting late September, they will no longer be able to log in to their Google accounts on devices running Android 2.3.7 (Gingerbread) and lower. “As part of our ongoing efforts to keep our users safe, Google will no longer allow sign-in on Android devices that run …

Google is going to block logins on old Android devices starting September Read More »

Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs

Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs

An unidentified threat actor has been exploiting a now-patched zero-day flaw VBA Malware in Internet Explorer browser to deliver a fully-featured VBA-based remote access trojan (RAT) capable of accessing files stored in compromised Windows systems, and downloading and executing malicious payloads as part of an “unusual” campaign. The backdoor is distributed via a decoy document …

Hackers Exploit Microsoft Browser Bug to Deploy VBA Malware on Targeted PCs Read More »

Google launches new Bug Bounties vulnerability rewards platform

Google launches new Bug Bounties vulnerability rewards platform

Google has announced a new Bug Bounties platform and community designed to host all its Vulnerability Rewards Programs (VRP) under the same roof. Since launching its first VRP more than ten years ago, the company has rewarded 2,022 security researchers from 84 different countries worldwide for reporting over 11,000 bugs. In all, Google says that the researchers have …

Google launches new Bug Bounties vulnerability rewards platform Read More »

Hack Tutorial #3: Recover, Move or Hack WhatsApp account using WhatsDumpExtractor

Hack Tutorial #3: Recover, Move or Hack WhatsApp account using WhatsDumpExtractor

General Information WDE Software (WhatsDumpExtractor) is a set of software modules written in Python, linked to each other to extract the encrypted database WhatsApp from Google Drive, decrypt and provide it to the user. WDE uses android emulator to authorize a user on the WhatsApp server and obtain a key file to decrypt the database. …

Hack Tutorial #3: Recover, Move or Hack WhatsApp account using WhatsDumpExtractor Read More »

Five Critical Password Security Rules Your Employees

Five Critical Password Security Rules Your Employees

In February 2021, Keeper surveyed 1,000 employees in the U.S. about their work-related password habits — and discovered that a lot of remote workers are letting password security go by the wayside. Here are 5 critical password security rules they’re ignoring. 1. Always use strong passwords Strong passwords are at least eight characters long (preferably …

Five Critical Password Security Rules Your Employees Read More »