Summary

Total Articles Found: 12

Top sources:

Top Keywords:

Top Authors

Top Articles:

  • MacOS Zero-Day Allows Trusted Apps to Run Malicious Code
  • Kerberos Authentication Spoofing: Don’t Bypass the Spec
  • Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers
  • Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming
  • DoorDash Data Breach Impacts Personal Data of Almost 5M Users
  • Google Titan Security Key Recalled After Bluetooth Pairing Bug
  • Microsoft Signs Malware That Spreads Through Gaming
  • MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed
  • SideWalk Backdoor Linked to China-Linked Spy Group ‘Grayfly’
  • Pro-Trump ‘Gettr’ Social Platform Hacked On Day One

Popular NFT Marketplace Phished for $540M

Published: 2022-07-11 20:06:10

Popularity: 43

Author: Nate Nelson

Keywords:

  • Cryptography
  • Hacks
  • In March, a North Korean APT siphoned blockchain gaming platform Axie Infinity of $540M.

    ...more

    Twitter Suspends Accounts Used to Snare Security Researchers

    Published: 2021-10-18 16:23:21

    Popularity: 88

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • Vulnerabilities
  • Web Security
  • The accounts were used to catfish security researchers into downloading malware in a long-running cyber-espionage campaign attributed to North Korea.

    ...more

    MFA Glitch Leads to 6K+ Coinbase Customers Getting Robbed

    Published: 2021-10-01 20:08:23

    Popularity: 191

    Author: Lisa Vaas

    Keywords:

  • Breach
  • Hacks
  • Mobile Security
  • Vulnerabilities
  • Coinbase suspects phishing led to attackers getting personal details needed to access wallets but also blamed a flaw in its SMS-based 2FA.

    ...more

    SideWalk Backdoor Linked to China-Linked Spy Group ‘Grayfly’

    Published: 2021-09-09 14:30:56

    Popularity: 115

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • Vulnerabilities
  • Web Security
  • Grayfly campaigns have launched the novel malware against businesses in Taiwan, Vietnam, the US and Mexico and are targeting Exchange and MySQL servers.

    ...more

    Kerberos Authentication Spoofing: Don’t Bypass the Spec

    Published: 2021-08-18 13:19:15

    Popularity: 1210

    Author: Yaron Kassner

    Keywords:

  • Hacks
  • InfoSec Insider
  • Vulnerabilities
  • Web Security
  • Yaron Kassner, CTO at Silverfort, discusses authentication-bypass bugs in Cisco ASA, F5 Big-IP, IBM QRadar and Palo Alto Networks PAN-OS.

    ...more

    Pro-Trump ‘Gettr’ Social Platform Hacked On Day One

    Published: 2021-07-07 03:27:13

    Popularity: 114

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Web Security
  • The newborn platform was inundated by Sonic the Hedgehog-themed porn and had prominent users' profiles defaced. Next, hackers posted its user database online.

    ...more

    Microsoft Signs Malware That Spreads Through Gaming

    Published: 2021-06-28 16:36:45

    Popularity: 221

    Author: Lisa Vaas

    Keywords:

  • Hacks
  • Malware
  • The driver, called "Netfilter," is a rootkit that talks to Chinese C2 IPs and aims to spoof gamers' geo-locations to cheat the system and play from anywhere, Microsoft said.

    ...more

    Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming

    Published: 2021-01-27 20:32:55

    Popularity: 440

    Author: Tara Seals

    Keywords:

  • Critical Infrastructure
  • Hacks
  • Vulnerabilities
  • Web Security
  • A new version of NAT slipstreaming allows cybercriminals an easy path to devices that aren't connected to the internet.

    ...more

    Critical Bug in WordPress Plugins Open Sites to Hacker Takeovers

    Published: 2019-12-13 18:33:39

    Popularity: 743

    Author: Tom Spring

    Keywords:

  • Hacks
  • Vulnerabilities
  • authentication bypass
  • Beaver Builder
  • Elementor
  • Ultimate addon
  • wordpress
  • One flaw found in WordPress plugins Ultimate Addons for Beaver Builder and Ultimate Addons for Elementor is actively being exploited.

    ...more

    DoorDash Data Breach Impacts Personal Data of Almost 5M Users

    Published: 2019-09-26 21:34:14

    Popularity: 436

    Author: Lindsey O'Donnell

    Keywords:

  • Breach
  • Hacks
  • data breach
  • Data Privacy
  • Data security
  • doordash
  • personal information
  • Security
  • third party provider
  • Accessed information includes delivery addresses, license numbers, names, phone numbers and more.

    ...more

    MacOS Zero-Day Allows Trusted Apps to Run Malicious Code

    Published: 2019-06-03 12:28:42

    Popularity: 1233

    Author: Tom Spring

    Keywords:

  • Hacks
  • Privacy
  • Vulnerabilities
  • apple
  • macOS
  • Mojave
  • Patrick Wardle
  • security bypass
  • synthetic mouse clicks
  • vulnerability
  • zero-day
  • Apple 0-Day allows hackers to mimic mouse-clicks to allow malicious behavior on macOS Mojave, despite mitigations.

    ...more

    Google Titan Security Key Recalled After Bluetooth Pairing Bug

    Published: 2019-05-15 20:01:32

    Popularity: 331

    Author: Lindsey O'Donnell

    Keywords:

  • Hacks
  • Vulnerabilities
  • Bluetooth
  • google
  • google recall
  • pairing protocol
  • Security Key
  • titan security keys
  • vulnerability
  • Google is offering free replacements for its Titan Security Key after discovering a misconfiguration in its pairing protocols.

    ...more

    end