Generative Data Intelligence

Tag: security researchers

iPhone, Android Ambient Light Sensors Allow Stealthy Spying

The ambient light sensors typically employed in smart devices for adjusting screen brightness could capture images of user interactions and could pose a unique...

‘Chaes’ Infostealer Code Contains Hidden Threat Hunter Love Notes

Appearing flattered by the dogged analysis of Chaes malware over the years, the infostealer's developer dropped secret messages in the latest version of the...

150,000 WordPress Sites at Risk Due to Vulnerable Plugin

Penka Hristovska Published on: January 17, 2024 Security researchers have uncovered a pair of critical vulnerabilities in a popular...

Who Is Behind Pro-Ukrainian Cyberattacks on Iran?

COMMENTARYUkrainian cyber forces have attacked Russian infrastructure and assets almost since the first day of the Russian invasion of Ukraine on Feb. 24, 2022....

Threat Group Using Rare Data Transfer Tactic in New RemcosRAT Campaign

A threat actor known for repeatedly targeting organizations in Ukraine with the RemcosRAT remote surveillance and control tool is back at it again, this...

Administrator Account For Middle East Internet Registry Hacked

The Regional Internet Registry for Europe, the Middle East, and Central Asia is investigating the compromise of an administrator account that has disrupted network...

Mandiant’s X (Twitter) Account Hacked to Promote Crypto Scam

The X (Twitter) account of Google's cybersecurity firm Mandiant was restored to its rightful owner Jan. 4 after the account was hacked and used...

Pilfered Data From Iranian Insurance and Food Delivery Firms Leaked Online

Cybercriminals broke into the systems of 23 leading Iranian insurance firms and SnappFood, Iran's leading online food ordering service, dumping millions of user profiles.The...

Attackers Abuse Google OAuth Endpoint to Hijack User Sessions

Attackers have been exploiting an undocumented Google OAuth endpoint to hijack user sessions and allow continuous access to Google services, even after a password...

LEO Access to Binance Data Allegedly Compromised By Hacker

Earlier this week, a BreachForums user by the name of Miembro announced the sale of access to a Binance data request portal, built...

Iranian ‘Seedworm’ Cyber Spies Target African Telcos & ISPs

An Iran-backed cyberespionage group is actively targeting telcos in North and East Africa.According to security researchers at Symantec, the latest cyberattacks by the advanced...

Iranian ‘Seedworm’ Cyber Spies Target African Telcos & ISPs

An Iran-backed cyberespionage group is actively targeting telcos in North and East Africa.According to security researchers at Symantec, the latest cyberattacks by the advanced...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?