Boeing, a major aircraft manufacturer and aerospace & defence contractor in the US, has confirmed the ransomware attack. A week before, on October 27, it was listed by LockBit ransomware on their Darknet site. Now, Reuters agency has confirmed that the incident was real. Boeing Hacked by LockBit On October 27, 2023, LockBit cybercrime group… Continue reading Boeing Hack Confirmed, LockBit Group Resposible
Author: Stephanie Adlam
I write about how to make your Internet browsing comfortable and safe. The modern digital world is worth being a part of, and I want to show you how to do it properly.
Malicious WhatsApp Mods Spread Through Telegram
Some WhatsApp mods, which are unofficial versions of the app, have been found to contain hidden spyware. This spyware is designed to steal personal information from your device. It’s alarming because it could put your privacy at risk. What are WhatsApp Mods? WhatsApp mods are unofficial, altered versions of the popular messaging app WhatsApp. There… Continue reading Malicious WhatsApp Mods Spread Through Telegram
New F5 BIG-IP Vulnerabilities Exploited In The Wild
Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution and SQL injection. The company explains it as a bad input validation. The worst part though is that both vulnerabilities were probably exploited in real-world attacks. F5 BIG-IP Vulnerabilities Allows SQL Injection and Remote Code Execution On October 26, 2023, F5 published two… Continue reading New F5 BIG-IP Vulnerabilities Exploited In The Wild
WeChat and Kaspersky Ban in Canada – What You Should Know?
The Canadian government has instituted a ban on the use of WeChat and Kaspersky applications on government-issued mobile devices, effective October 30, 2023. The decision, which has raised considerable attention, stems from what the Canadian government has deemed an “unacceptable level of risk.” WeChat and Kaspersky products are Banned in Canada The Canadian government, like… Continue reading WeChat and Kaspersky Ban in Canada – What You Should Know?
New Confluence Vulnerability Leads to Unauthorised Access
Another vulnerability in the flagship product of Atlassian corporation, Confluence, allows hackers to access the servers and dump the data. As the company claims, the issue sits in the improper authorization within the Data Center and Server apps. The company already offers the patches for this breach. Confluence Data Center and Server Vulnerability Leads to… Continue reading New Confluence Vulnerability Leads to Unauthorised Access
Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?
Octo Tempest, a financially-motivated hacking group, has been labeled “one of the most dangerous financial criminal groups” by Microsoft. Known as UNC3944 and 0ktapus, the group has gained attention for bold cyber attacks. What is Octo Tempest Cybercrime Gang? Octo Tempest’s journey into the world of cybercrime is an intriguing one. Only a few months… Continue reading Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?
IoT Malware Attacks Grow by 400% in 2023
IoT malware has been a major concern over the last decade. However, trends show that things are turning even worse – recent ZScaler research shows a 400% growth in IoT malware attacks in 2023 only. And most likely, it will become worse. Massive jump in attacks on IoT infrastructure According to the study, the number… Continue reading IoT Malware Attacks Grow by 400% in 2023
What is Android:TrojanSMS-PA detection?
Android:TrojanSMS-PA is a detection name from a built-in Huawei security tool. This particular name recently appeared as a detection of the Google app on Huawei devices. However, this name is not a 100% false positive, and here is why. What is Android:TrojanSMS-PA? As I said, Android:TrojanSMS-PA detection name is one of hundreds used by an… Continue reading What is Android:TrojanSMS-PA detection?
Halloween Shopping Scams — Ways to Detect & Avoid
2023 Halloween, similarly to other holidays and events of this year, will likely become a topic of a huge number of shopping scams. Con actors create websites that offer purchasing various thematic goods at low prices, while in fact they simply take your money and vanish. What are online shopping scams? Online shopping scams are… Continue reading Halloween Shopping Scams — Ways to Detect & Avoid
WinRAR Vulnerability Allows Arbitrary Code Execution
Over the past few weeks, Google’s Threat Analysis Group (TAG) has reported a worrying trend. Experts have observed government-sponsored actors from different nations exploiting this WinRAR vulnerability as part of their operations. The vulnerability received an index of CVE-2023-38831. Even though a patch has since been released, many users remain vulnerable to potential attacks. WinRAR… Continue reading WinRAR Vulnerability Allows Arbitrary Code Execution