Saudi Arabia invests heavily in Israeli spy tools

10 hours ago · 0 comments
post-image

Hired hackers - who are they and how do they earn?

14 hours ago · 0 comments
post-image

Former Conti members team up and hack people

14 hours ago · 0 comments
post-image
article-image10 hours ago

Saudi Arabia invests heavily in Israeli spy tools

article-image14 hours ago

Hired hackers - who are they and how do they earn?

article-image14 hours ago

Former Conti members team up and hack people

Blog Feed

Popular

Latest

Recent

    • Vulnerability in Dahua IP cameras allows you to take full control over the device

      Details have been released about a vulnerability in the Dahua Open Network Video Interface Forum (ONVIF) standard implementation that could lead to IP cameras being taken over. ONVIF governs the development and use of an open standard for how CCTV cameras and IP-based access control systems can interoperate with each other regardless of vendor.Issue CVE-2022-30563 (CVSS Score: 7.4) fixed on June 28 affects the following products:Dahua ASI7XXX: Versions up to v1.000.0000009.0.R.220620;Dahua IPC-HDBW2XXX: Versions up to v2.820.0000000.48.R.220614;Dahua IPC-HX2XXX: Versions prior to v2.820.0000000.48.R.220614.The vulnerability discovered by Nozomi Networks is related to the "WS-UsernameToken" authentication mechanism in some...

      post-image
    • Free coffee and donut in exchange for constant surveillance

      Fast food chain Tim Hortons has agreed to settle several class-action lawsuits that accuse the company of tracking the location of customers through its app without their consent. Under the proposed agreement, which requires a judge's approval, spyed customers in Canada will receive a free hot drink and baked goods. In other words, in exchange for customer location data, the company will give them coffee and a donut.Notably, Tim Hortons promised to remove all customer location data between April 1, 2019 and September 30, 2020, and has asked Radar Labs, a data collection service provider,...

      post-image
    • Early research confirms high efficacy of DMT in the treatment of symptoms of depression

      A new paper, published in the journal Neuropsychopharmacology by a medical team at Yale University, claims that DMT is an extremely effective and fast-acting treatment for depressive symptoms. Moreover, as the study indicates, the substance has a fairly long-term effect on the person without additional therapy, that is, the participation of a psychologist during the session of the substance use.Potentially, this factor sets DMT apart from other psychedelic substances currently being widely tested as treatments for stress and depressive illnesses, such as psilocybin and MDMA. As the authors of the study themselves note, this effect...

      post-image
    • US Treasury blocks Tornado Cash crypto platform

      Cryptocurrency platform Tornado Cash came under US Treasury sanctions. This was reported on the website of the US Department.The report says that the work of this platform was blocked due to the fact that it was used in the laundering of billions of dollars, as well as to circumvent sanctions against the DPRK.A blockchain protocol running on the Ethereum network, Tornado Cash allows you to increase the confidentiality of transactions by hiding the connection between the source and recipient of tokens. However, the service is often used by hackers to withdraw funds from attacked projects.Since...

      post-image
    • Saudi Arabia invests heavily in Israeli spy tools

      Saudi Leaks, an opposition website citing unnamed sources, said Saudi officials have signed contracts with Israeli firms that involve millions of dollars in annual investments to acquire the most advanced cyber espionage and surveillance technologies.The growing covert cyber-espionage relationship between Saudi Arabia and Israeli companies is set to pave the way for the so-called CyberIC plan, which aims to protect the Kingdom's cybersecurity sector, the sources said.The launch of the plan was announced by the Saudi Arabian National Cybersecurity Authority (NCA) earlier this week. The program aims to develop and build capacity in the field...

      post-image
    • Hired hackers - who are they and how do they earn?

      Hired hackers are secretive cyber experts or groups that specialize in infiltrating organizations and stealing information. They offer their services to people who cannot carry out such an attack on their own for any reason (for example, due to lack of necessary skills).Since 2020, hackers for hire have become even more active, hacking into everything they can get their hands on and impersonating other hackers or users who hired them. One of the reasons for this activity was the COVID-19 epidemic, during which hackers gained the ability to control computers through smart public communication channels...

      post-image
    • Former Conti members team up and hack people

      The Silent Ransom Group (Luna Moth), Quantum and Roy/Zeon, former members of the Conti syndicate, have adopted BazarCall (BazaCall) phishing attacks as their primary method of gaining initial access to the victim's network, according to a new report from Advanced Intelligence experts. This allows attackers to carry out targeted attacks that are harder to detect and stop due to the use of social engineering.The shift to social engineering was driven by the predictability of conventional attacks, which drove down profits as cybersecurity professionals began to implement effective mitigation measures.“We cannot win the technology war because...

      post-image
    • Darknet marketplaces start collaborating with Mexican cartels

      The emergence of new marketplaces cooperating with real Mexican criminals was noticed by DarkOwl analysts. They were able to identify a trend: attackers began to move from large marketplaces that attract the attention of law enforcement agencies to smaller, less well-known sites.The sites discovered by DarkOwl are a mix of old and new marketplaces, spiced up with new features and an updated interface.Cartel de Sinaloa (C.D.S. Market) is a marketplace that may be linked to the infamous Sinaloa Cartel, a major Mexican crime syndicate. The site sells banned substances, various chemicals, weapons, malware, and offers...

      post-image
    • Saudi Arabia invests heavily in Israeli spy tools

      Saudi Leaks, an opposition website citing unnamed sources, said Saudi officials have signed contracts with Israeli firms that involve millions of dollars in annual investments to acquire the most advanced cyber espionage and surveillance technologies.The growing covert cyber-espionage relationship between Saudi Arabia and Israeli companies is set to pave the way for the so-called CyberIC plan, which aims to protect the Kingdom's cybersecurity sector, the sources said.The launch of the plan was announced by the Saudi Arabian National Cybersecurity Authority (NCA) earlier this week. The program aims to develop and build capacity in the field...

      post-image
    • Hired hackers - who are they and how do they earn?

      Hired hackers are secretive cyber experts or groups that specialize in infiltrating organizations and stealing information. They offer their services to people who cannot carry out such an attack on their own for any reason (for example, due to lack of necessary skills).Since 2020, hackers for hire have become even more active, hacking into everything they can get their hands on and impersonating other hackers or users who hired them. One of the reasons for this activity was the COVID-19 epidemic, during which hackers gained the ability to control computers through smart public communication channels...

      post-image
    • Former Conti members team up and hack people

      The Silent Ransom Group (Luna Moth), Quantum and Roy/Zeon, former members of the Conti syndicate, have adopted BazarCall (BazaCall) phishing attacks as their primary method of gaining initial access to the victim's network, according to a new report from Advanced Intelligence experts. This allows attackers to carry out targeted attacks that are harder to detect and stop due to the use of social engineering.The shift to social engineering was driven by the predictability of conventional attacks, which drove down profits as cybersecurity professionals began to implement effective mitigation measures.“We cannot win the technology war because...

      post-image
    • Darknet marketplaces start collaborating with Mexican cartels

      The emergence of new marketplaces cooperating with real Mexican criminals was noticed by DarkOwl analysts. They were able to identify a trend: attackers began to move from large marketplaces that attract the attention of law enforcement agencies to smaller, less well-known sites.The sites discovered by DarkOwl are a mix of old and new marketplaces, spiced up with new features and an updated interface.Cartel de Sinaloa (C.D.S. Market) is a marketplace that may be linked to the infamous Sinaloa Cartel, a major Mexican crime syndicate. The site sells banned substances, various chemicals, weapons, malware, and offers...

      post-image
Read all posts

Tuesday, 16 August

Comments Feed