index cybersecurity

[Link] Elon Musk fails in bid to delay trial over terminated Twitter deal

Read: 8/9/2022 www.theguardian.com

Elon Musk has failed in a bid to delay a trial over his termination of a $44bn (£38bn) deal to buy Twitter. The social media company is suing Musk over his decision to walk away from the transaction and is demanding that he complete the deal on the agreed terms.

appeals bots celebrity social media corporate acquisitions corporate legal threats corporate social media cybersecurity delaware delays elon musk lmao corporations lmao elon musk musk twitter purchase rich people social media social media social media blowback social media bots social media companies tech tech celebrities tech companies tech whistleblowers tesla tesla court cases twitter twitter celebrities us courts usa whistleblowers


[Link] Researchers Find Vulnerability in Software Underlying Discord, Microsoft Teams, and Other Apps

Read: 12/8/2022 www.vice.com

In all these cases, the researchers submitted vulnerabilities to Electron to get them fixed, which earned them more than $10,000 in rewards. The bugs were fixed before the researchers published their research. 

chat software chromium cyber hacks cybersecurity discord discord hacks electron apps google chrome microsoft microsoft teams tech tech companies vice.com vulnerabilities vulnerability disclosure web web browser apps web browsers web services


[Link] Catalan leaders targeted using NSO spyware, say cybersecurity experts

Read: 18/4/2022 www.theguardian.com

Dozens of pro-independence Catalan figures, including the president of the north-eastern Spanish region and three of his predecessors, have been targeted using NSO Group’s Pegasus spyware, according to a report from cybersecurity experts.

catalan movement catalonia citizen lab cyber hacks cybersecurity cybersecurity industry europe independence movements lawyers nso group pegasus project spain spyware surveillance


[Link] 'We Are Fucked': Crypto Stablecoin Collapses After $182M Hack

Read: 18/4/2022 www.vice.com

On Sunday, cybersecurity firm PeckShield reported the attack on Beanstalk Farms, saying hackers stole more than $80 million for themselves, but the protocol’s losses appeared to be even higher. The company later said its initial analysis showed the losses amounted to around $182 million. 

crypto tumbler cryptocurrency cryptocurrency discords cryptocurrency hacks cryptocurrency prices cyber crime cyber hacks cybersecurity defi ethereum lmao cryptocurrency millions smart contracts stablecoins vice.com


[Link] Advice on How to Use Telegram Safely

Read: 13/3/2022 www.vice.com

Russian police have started stopping people in the street and scrolling through messages stored on their phone, according to a video uploaded to social media.

cyberforensics cybersecurity encryption end to end encryption explanations government crackdown russia crackdown telegram telegram channels ukraine ukraine conflict 2022 ukraine invasion ukraine russia war vice.com


[Link] Canadian accused of unleashing NetWalker ransomware extradited to US

Read: 13/3/2022 www.theregister.com

US prosecutors on Thursday said they have extradited a Canadian man to America to face charges that he conspired to distribute ransomware. Sébastien Vachon-Desjardins, 34, of Gatineau, Quebec, was detained by Canadian authorities on January 27, 2021.

bitcoin blockchain blockchain analysis canada canada cryptocurrency canada law crypto wallets cryptocurrency cryptocurrency regulation cryptocurrency seizures cyber crime cyber hacks cybercrime cybercrime community cybercrime income cybercrime infrastructure cyberforensics cybersecurity cybersecurity industry hacker groups hackers illicit income north america ransomware russia cyber capability russia cybercrime us extradition usa


[Link] Russian Cybersecurity Giant Kaspersky Tries to Maintain Neutrality During Ukraine War

Read: 1/3/2022 www.vice.com

The statement encapsulates the company’s position since Russia invaded Ukraine six days ago—that of attempted neutrality in a war where silence or fence sitting is implicitly siding with the Russian forces.

antivirus cybersecurity cybersecurity industry kaspersky russia russia crackdown russia geopolitics russian companies russian law sanctions ukraine ukraine conflict 2022 ukraine geopolitics ukraine invasion ukraine russia relations ukraine russia war vice.com


[Link] Stop Leaving Your Smartphone's Bluetooth On

Read: 8/2/2022 lifehacker.com

Bluetooth is a handy feature that allows you to easily connect up your various devices, whether you’re trying to get your new wireless headphones to talk to your Android phone or connecting your Apple Watch to your iPhone.

bluetooth bluetooth devices car phone integration cybersecurity data security mobile devices mobile phone tech mobile phone use mobile phones phone hacks phone tracking privacy security vulnerabilities


[Link] CoinDesk CMS Vulnerability Let Hackers Trade on Nonpublic Info

Read: 5/2/2022 www.vice.com

“The issue is now fixed and added safeguards have been put in place. We regret this unintended deviation from our commitment to level playing fields in crypto markets,” Worth added.

coindesk crypto trading cryptocurrency cryptocurrency hacks cyber crime cyber hacks cybercrime cybersecurity insider trading lmao lmao cryptocurrency vice.com


[Link] This NFT on OpenSea Will Steal Your IP Address

Read: 27/1/2022 www.vice.com

NFTs are usually passive affairs. A consumer buys the token, and then sells or stores the NFT. The NFT doesn’t really do anything.

crypto exchanges crypto tokens crypto trading cryptocurrency cryptocurrency hacks cyber hacks cybersecurity cybersecurity industry denial of service exploits ip addresses metamask nft critiques nfts opensea personal data privacy privacy circumvention surveillance vice.com vulnerabilities xss exploits


[Link] Lawmakers Plan Legislation to ‘Ban Surveillance Advertising’

Read: 19/1/2022 www.vice.com

Lawmakers have proposed new legislation that they say would ban surveillance-based advertising. The legislation would target the underlying practice of targeted or personalized ads that facilitates surveillance-based advertising itself.

adl organisation advertising advertising blowback big data business models capitalism cybersecurity data collection data cross referencing data industry data markets data modeling data processing data science data security duckduckgo epic organisation facebook ads gdpr google ads internet internet advertising internet infrastructure personal data personal internet history privacy privacy circumvention proton company search engines surveillance targeted advertising tech companies ubiquitous internet us democrats us ftc us law usa vice.com web services


[Link] A Hacker Is Negotiating With Victims on the Blockchain After $1.4M Heist

Read: 19/1/2022 www.vice.com

Hackers took advantage of a vulnerability in a blockchain service to steal around $1.4 million from users earlier this week.

blockchain crypto exchanges crypto tokens crypto trading crypto wallets cryptocurrency cryptocurrency hacks cyber crime cyber hacks cybercrime cybersecurity ethereum smart contracts vice.com white hat black hat


[Link] Researcher Found Way to Brute Force Verizon Customer PINs Online

Read: 6/12/2021 www.vice.com

An independent security researcher discovered a way to brute force Verizon PINs online, meaning they could potentially break into Verizon customer accounts. In response, Verizon has taken the impacted web pages offline.

brute force hacks cyber crime cyber hacks cybercrime cybercrime community cybersecurity race conditions sim cards sim porting sim swappers us telcos us telecoms usa verizon vice.com vulnerabilities vulnerability disclosure


[Link] Hacked Cryptocurrency Platform Begs Hacker to Please Return $119 Million

Read: 6/12/2021 www.vice.com

The hack on BadgerDAO took advantage of an old-school web-based attack: the hacker was able to steal an API key that gave them control of BadgerDAO’s account on Cloudflare, the project’s content delivery network for its site.

cloudflare crypto exchanges crypto tokens crypto wallets cryptocurrency cryptocurrency hacks cyber crime cyber hacks cybercrime cybersecurity daos public statements vice.com


[Link] Hackers Steal $119M From ‘Web3’ Crypto Project With Old School Attack

Read: 2/12/2021 www.vice.com

Notably, the hack did not involve complicated smart contract exploits. Instead, it was a front-end attack targeting BadgerDAO's web infrastructure, in particular its Cloudflare account, BadgerDAO’s content delivery network.

cloudflare cryptocurrency cryptocurrency hacks cyber crime cyber hacks cybercrime cybersecurity daos defi internet infrastructure social engineering vice.com


[Link] Court Throws Out Messages Obtained by FBI Honeypot Phone Company Anom

Read: 30/11/2021 www.vice.com

On Tuesday a Finnish court ruled that chat messages secretly gathered by the FBI from encrypted phone company Anom can’t be used as evidence against two particular suspects, according to a report from Finnish outlet Iltalehti.

anom phones crime crime infiltration crime networks criminal groups criminal investigation cyber crime cybercrime cybersecurity encryption end to end encryption europe european crime european union fbi finland finland police honeypot message services organised crime privacy privacy circumvention surveillance vice.com


[Link] Web trust dies in darkness: Hidden Certificate Authorities undermine public crypto infrastructure

Read: 22/11/2021 www.theregister.com

Security researchers have checked the web's public key infrastructure and have measured a long-known but little-analyzed security threat: hidden root Certificate Authorities. Certificate Authorities, or CAs, vouch for the digital certificates we use to establish trust online.

certificate authorities chain of trust cryptography cybersecurity fake identity fraud identity documents identity theft internet internet infrastructure mistaken identity public key crypto ssl stolen identity threat vectors university research unknown identity vulnerabilities web browsers


[Link] Researchers wait 12 months to report vulnerability with 9.8 out of 10 severity rating

Read: 12/11/2021 arstechnica.com

About 10,000 enterprise servers running Palo Alto Networks’ GlobalProtect VPN are vulnerable to a just-patched buffer overflow bug with a severity rating of 9.8 out of a possible 10.

cybersecurity cybersecurity industry vpns vulnerabilities vulnerability disclosure


[Link] Top Google Result for NFT Marketplace OpenSea Was a Phishing Site

Read: 11/11/2021 www.vice.com

Earlier this week, if you Googled “OpenSea” looking for the eponymous NFT marketplace, you might have found what looks like the site right at the top of Google.

advertising algorithmic reccomend algorithms alphabet crime crypto wallets cyber crime cyber hacks cybercrime cybersecurity fraud google google ads google search internet search nfts opensea phishing search engine delisting search engines vice.com vulnerabilities web services


[Link] Why are the Last 4 Digits of an SSN Important?

Read: 11/11/2021 www.stilt.com

Social Security Numbers are issued by the government and they are used for various purposes. A lot of times, different companies will use the last four digits of your SSN. However, these four digits are crucial and you need to protect them. But why are the last 4 digits of an SSNso important?

american tax cybersecurity data collection data cross referencing data industry data markets data security data theft government government agencies identity documents identity theft identity verification infocalypse personal data security social engineering social security stolen identity tax taxpayers us agencies us irs us social security usa


[Link] Hostage-Style Bitcoin Scam Videos Are Spreading Across Instagram

Read: 9/11/2021 www.vice.com

Hackers are forcing Instagram users to film hostage-style videos instructing their followers to participate in fraudulent get-rich-quick Bitcoin schemes as part of a new kind of scam that is spreading across the Facebook-owned app.

bitcoin crime cryptocurrency cryptocurrency hacks cryptocurrency scams cyberpunk future cybersecurity extortion facebook facebook support fake identity fraud hacker groups hackers hacking methods hostages identity theft identity verification infocalypse instagram instagram influencers lmao cryptocurrency meta company pyramid schemes scams social engineering social media social networks socmed verification stolen identity vice.com


[Link] Hackers are stealing data today so quantum computers can crack it in a decade

Read: 9/11/2021 www.technologyreview.com

The threat comes from quantum computers, which work very differently from the classical computers we use today. Instead of the traditional bits made of 1s and 0s, they use quantum bits that can represent different values at the same time.

cryptography cyberpunk future cybersecurity data archaeology data collection data security data storage data theft encryption end to end encryption future future problems future tech infocalypse patient people post-quantum cryptography quantum computing sad lmao speculative futures us dhs


[Link] Hackers Apologize to Arab Royal Families for Leaking Their Data

Read: 6/11/2021 www.vice.com

Among the data Conti leaked, there were sensitive files belonging to celebrities like David Beckham, Oprah Winfrey, and Donald Trump, according to The Daily Mail. There was also, according to the hackers themselves, information belonging to the UAE, Qatar, and Saudi royal families. 

assassination conti hacker group cyber crime cyber hacks cybercrime cybersecurity government threats hacker groups hackers hacktivism public apologies qatar ransomware saudi arabia threats united arab emirates vice.com



[Link] US Sanctions Could Cut-off NSO from Tech It Relies On

Read: 3/11/2021 www.vice.com

The U.S. government added NSO Group to a federal denylist that prohibits any American company or individual from selling or providing services to the controversial Israeli spyware seller. The sanctions effectively prohibit any U.S. company, as well as American citizens working in the U.S.

corporations cybersecurity cybersecurity industry israel israeli businesses lmao corporations malicious software privacy privacy circumvention sanctions software spyware surveillance usa vice.com


[Link] Data-breached Guntrader website calls in liquidators, is reborn as Guntrader 2 Ltd

Read: 3/11/2021 www.theregister.com

A British firearms sales website's owner has called in the liquidators as his company faces data breach lawsuits – while continuing to trade from a newly incorporated business. Guntrader Ltd entered a creditors' voluntary liquidation on 22 October.

after market sales bankruptcy corporate accountability corporate liability corporate rebrand corporate social media corporations corpos cyber crime cyber hacks cybercrime cybersecurity data breach data security data theft government agencies grey market gun control guns hackers insurance lmao corporations markets online marketplaces performative social media product announcements public statements social media social media blowback social networks uk uk agencies uk businesses uk home office uk law uk nca weapons web platforms web services


[Link] Trojan Source attack: Code that says one thing to humans tells your compiler something very different, warn academics

Read: 3/11/2021 www.theregister.com

Updated The way Unicode's UTF-8 text encoding handles different languages could be misused to write malicious code that says one thing to humans and another to compilers, academics are warning.

code compilers cyber hacks cyberpunk future cybersecurity dependency attack encryption github hidden in plain site infocalypse malicious software novel attacks optical illusion software software dependencies software development source code supply chains threat vectors trojan horse unicode unreliable source lol vulnerabilities



[Link] Looks like Steam is getting a QR code login option

Read: 29/10/2021 www.pcgamer.com

A recent update to Steam's code includes signs of an upcoming new login method: Scanning a QR code with the Steam mobile app. That's according to a tweet by SteamDB creator Pavel Djundik.

apps authenticity cybersecurity identity verification mobile apps multi factor auth qr codes steam steam deck valve video game stores video games web services


[Link] Instagram Hacker Forces Victim to Make Hostage-Style Video

Read: 28/10/2021 www.vice.com

A hacker is taking over Instagram accounts before forcing their owners to make hostage-style videos promoting the hacker's money-making scams to try and get their money back.

bitcoin blackmail crime cryptocurrency scams cyber crime cyber hacks cybersecurity facebook facebook support fake identity hackers hostages identity theft identity verification infocalypse instagram mistaken identity pyramid schemes scams social engineering social media social media abuse social media crime social media witness social networks stolen identity theft vice.com


[Link] Cryptocurrency Loan Platform Implodes In $130 Million Hack

Read: 28/10/2021 www.vice.com

On Wednesday, crypto lending service C.R.E.A.M. Finance was the target of a hack that stole over $130 million. It’s not only one of the largest heists ever targeting a so-called “decentralized finance” (DeFi) platform, but also the third such hack targeting C.R.E.A.M.

crime crypto exchanges crypto tokens cryptocurrency cryptocurrency hacks cryptocurrency loans cyber crime cyber hacks cybersecurity ethereum financial services financial transactions fintech hackers lmao cryptocurrency theft us sec vice.com vulnerabilities


[Link] Hackers Disrupt Gas Stations in Iran and Deface Billboards to Blame Supreme Leader

Read: 27/10/2021 www.vice.com

It’s unclear who is behind the attack. But the methods and impact are reminiscent of a hack in July that paralyzed Iran’s train system.

attacks on infrastructure civil infrastructure cyber crime cyber hacks cybercrime cybersecurity cyberwar dissent energy energy crisis energy security energy shortages fossil fuels greater middle east hackers hacktivism hardline islam iran iranian dissent iranian infrastructure iranian protests iranian supreme leader khamenei state media vice.com


[Link] The 14-Year-Old Who Founded Girls Who Hack Is Inspiring the Next Generation of Hackers

Read: 25/10/2021 www.vice.com

Bianca Lewis, or as she is known in the hacker world: BiaSciLab, is part of the next generation of hackers. At 14 years old, she has already made a name for herself in hacker conference circles when a few years ago, she was among a group of kids that hacked into an election reporting system.

code cryptography cybersecurity cybersecurity industry girls who hack hackers inclusion interviews representation software software development stem vice.com


[Link] FBI, others crush REvil using ransomware gang’s favorite tactic against it

Read: 25/10/2021 arstechnica.com

Four days ago, the REvil ransomware gang’s leak site, known as the “Happy Blog,” went offline. Cybersecurity experts wondered aloud what might have caused the infamous group to go dark once more. One theory was that it was an inside job pulled by the group’s disaffected former leader.

attacks on infrastructure civil infrastructure cyber crime cyber hacks cybercrime cybercrime community cybercrime infrastructure cyberforensics cybersecurity cyberwar fbi hacker groups hacker tools hackers infrastructure failure malicious software ransomware revil group us infrastructure


[Link] How hackers hijacked thousands of high-profile YouTube accounts

Read: 25/10/2021 arstechnica.com

Since at least 2019, hackers have been hijacking high-profile YouTube channels. Sometimes they broadcast cryptocurrency scams, sometimes they simply auction off access to the account.

alphabet bitcoin cookie theft credential theft cryptocurrency cryptocurrency scams cyber crime cyber hacks cybercrime cybercrime income cyberforensics cybersecurity fake identity google hacker groups hacker tools hackers identity theft leaked credentials multi factor auth phishing scams social engineering social media social media companies social networks stolen credentials theft youtube youtube influencers youtube stars


[Link] Recycled Cobalt Strike key pairs show many crooks are using same cloned installation

Read: 25/10/2021 www.theregister.com

Around 1,500 Cobalt Strike beacons uploaded to VirusTotal were reusing the same RSA keys from a cracked version of the software, according to a security researcher who pored through the malware repository.

cybersecurity hacker groups hacker tools hackers malicious software piracy piracy software ransomware software software risks


[Link] The World's First Ransomware Came on a Floppy Disk in 1989

Read: 23/10/2021 www.vice.com

In December 1989, Willems worked at a Belgian insurance firm, and put the disk into a work computer. Bizarrely, it presented a questionnaire, the answers of which told the user whether or not they were in danger of contracting HIV/AIDS. Willems completed the quiz, and didn't think much more of it.

aids bitcoin criminal history cryptocurrency cryptolocker cyber crime cyber hacks cybercrime cybercrime history cybersecurity data archaeology history hiv internet internet history malicious software malware old tech oldtech panama ransomware social engineering south america tech tech archaeology usa


[Link] Ransomware Gang Says the Real Ransomware Gang Is the Federal Government

Read: 22/10/2021 www.vice.com

On Friday, a competing ransomware gang that calls itself Conti released a statement titled “ReviLives,” in support of the REvil gang, which was the target of the international operation.

computer crime crime cyber crime cyber hacks cybercrime cybercrime community cybercrime income cybersecurity hacker groups hackers opinion pieces ransomware twitter us geopolitics us government usa vice.com



[Link] The ‘Leak’ of Warzone’s New Anti-Cheat System Was Actually Part of the Plan

Read: 15/10/2021 www.vice.com

On Wednesday, Activision bombastically announced its new anti-cheat system—called RICOCHET—and promised to eradicate most cheaters from its massively popular online games such as Call of Duty: Warzone.

anti cheat systems call of duty corporate leaks cybersecurity intentional leaks leaks os kernel vice.com video game cheats video game communities video game hacks video games


[Link] Cheat Maker Is Not Afraid of Call of Duty’s New Kernel-Level Anti-Cheat

Read: 13/10/2021 www.vice.com

Activision announced its new anti-cheat system, called RICOCHET, on Monday. The company also said the new system will run in the kernel, the core of the operating system, which controls and has access to most of the computer's functions.

activision anti cheat systems blizzard call of duty cybersecurity multiplayer games os kernel vice.com video game announcements video game cheats video game communities video game hacks video games vulnerabilities


[Link] CIA Funding Arm Gave Encrypted App Wickr $1.6 Million

Read: 12/10/2021 www.vice.com

In-Q-Tel, a nonprofit investment firm started by the Central Intelligence Agency (CIA), recently poured more than $1.6 million into encrypted messaging platform Wickr, according to public disclosure records reviewed by Motherboard. The $1.

apps cybersecurity end to end encryption funding investment firms investors message services privacy us cia usa vice.com wickr


[Link] Hackers drain cryptocurrency accounts of thousands of Coinbase users

Read: 10/10/2021 www.pcgamer.com

Between March and May of 2021, hackers managed to get into the accounts and move funds off the platform, draining some accounts dry. Thousands of customers had already begun to complain to Coinbase that funds had vanished from their accounts.

coinbase crypto exchanges cryptocurrency cryptocurrency hacks cyber crime cyber hacks cybersecurity hacks multi factor auth phishing vulnerabilities


[Link] This $40 Trojan virus is a reminder to two-factor all your gaming accounts

Read: 7/10/2021 www.pcgamer.com

Online security firm Kaspersky, makers of one of the best antivirus software options out there,has in recent years been emphasising that gaming accounts are an extremely attractive target for the bad 'uns. Last month for example it reported blocking 5.

credential theft cybersecurity malicious software trojan horse video game hacks video games vulnerabilities


[Link] Former OnlyFans Employees Could Access Users’ and Models' Personal Information

Read: 30/9/2021 www.vice.com

Some former OnlyFans support staff employees still had access to users' data—including sensitive financial and personal information—even after they stopped working for the company used by sex workers to sell nudes and porn videos.

cybersecurity insider threat onlyfans pornography privacy sex work tech companies vice.com vulnerabilities web services


[Link] He escaped the Dark Web’s biggest bust. Now he’s back

Read: 29/9/2021 arstechnica.com

Just over four years ago, the US Department of Justice announced the takedown of AlphaBay, the biggest dark web market bust in history.

automated systems bitcoin cryptocurrency cyber crime cybercrime cybercrime community cybercrime infrastructure cyberforensics cybersecurity darknet darknet markets darktech ddos decentralisation drug busts hidden services interviews monero onion sites opsec tor


[Link] The NSA and CIA Use Ad Blockers Because Online Advertising Is So Dangerous

Read: 23/9/2021 www.vice.com

Lots of people who use ad blockers say they do it to block malicious ads that can sometimes hack their devices or harvest sensitive information on them. It turns out, the NSA, CIA, and other agencies in the U.S.

ad blockers cybersecurity data collection data cross referencing internet advertising malicious software personal data privacy surveillance us cia us nsa usa vice.com


[Link] Police Announce Huge Bust of Mafia’s Cyber Crime Operations

Read: 20/9/2021 www.vice.com

Police in Europe arrested 106 people accused of working for several Italian Mafia groups and laundering more than 10 million euros they made through various cybercrimes.

crime criminal groups cryptocurrency cyber crime cybercrime cybersecurity europe european crime european union europol fraud hacker groups hacking as a service italy mafia organised crime phishing phone hacks police spain vice.com


[Link] Docker changes its subscription plans, usage rules, and product line

Read: 2/9/2021 www.zdnet.com

For all Docker's container technology popularity, Docker, the company, has its problems. First, Docker had trouble finding a working business plan. Then, Docker ran short of funds.

containerisation cybersecurity docker software software announcements software development subscription models


[Link] FTC Orders Spyware Vendor to Stop Business

Read: 1/9/2021 www.vice.com

The FTC has banned a stalkerware vendor called SpyFone and its CEO Scott Zuckerman from working in the surveillance business, the agency said in an announcement on Wednesday.

cyber crime cyber hacks cybercrime cybersecurity domestic violence eff malicious software stalkerware stalking us ftc usa vice.com


[Link] Step 1: Do a Google search. Ransomware hacker goes rogue, leaks gang's plan.

Read: 26/8/2021 www.nbcnews.com

Someone claiming to work with one of the most notorious ransomware gangs says they’re fed up with how extortion money is divvied up and has leaked a host of the gang's files on a hacker forum.

criminal groups cyber crime cybersecurity google hacker groups leaks ransomware russia


[Link] China moves to protect personal data form misuse by tech companies

Read: 25/8/2021 the-pen.co

There is considerable interest in efforts by the Chinese government to impose greater control over major private enterprises operating in the country. Critics see this as an attack of freedom to do business. Supporters see it as a justified crackdown on corporate greed.

australia australian business australian government china china law chinese crackdown cybersecurity data collection data modeling personal data privacy privacy circumvention social media social media companies tech companies


[Link] New law passes giving AFP more power to infiltrate online criminal networks

Read: 25/8/2021 www.news.com.au

Police will have greater powers to infiltrate the dark web to crack down on paedophiles and criminals after a new law passed giving them amped-up surveillance capabilities online.

afp asio aus drugs aus one nation australia australian crime australian greens australian law csam cyber crime cybersecurity darknet darknet markets data storage drug dealing drugs police powers


[Link] Australian businesses stop reporting ransomware attacks over exfiltration doubts

Read: 24/8/2021 www.itnews.com.au

Australian businesses are incorrectly relying on what they think is a loophole in notifiable data breach laws to avoid reporting ransomware infections.

australia australian business australian law cyber crime cybersecurity ransomware


[Link] Researcher's First Hack Was to Make Minesweeper Incredibly Easy to Beat

Read: 23/8/2021 www.vice.com

Harpaz, who is now a security researcher at cybersecurity firm Guardicore, was already working in tech and had a degree in computer science when she got curious about hacking. A colleague suggested she try reverse engineering, the art of analyzing and deconstructing software. 

cybersecurity interviews minesweeper vice.com video game hacks video games


[Link] Spaghetti Detective Users Boiled By Security Gaffe

Read: 22/8/2021 hackaday.com

For readers that might not spend their free time watching spools of PLA slowly unwind, The Spaghetti Detective (TSD) is an open source project that aims to use computer vision and machine learning to identify when a 3D print has failed and resulted in a pile of plastic “spaghetti” on the build p

3d printing cybersecurity hackaday products vulnerabilities web services


[Link] A Third of Global Companies Have Experienced Ransomware Attack, Survey Finds

Read: 18/8/2021 www.vice.com

Analysts surveyed almost 800 companies and found that companies based in the U.S. experienced ransomware attacks at a much lower rate (7 percent) than international companies (37 percent) this past year. The survey focused on companies with more than 500 employees.

cybercrime cybersecurity data theft ransomware us companies usa vice.com


[Link] New phishing campaign uses Morse code to bypass security controls

Read: 15/8/2021 www.itpro.co.uk

Hackers used Morse code to evade detection in a year-long phishing campaign, according to Microsoft researchers. Researchers said the campaign, first spotted in July 2020, targeted Office 365 users and attempted to get them to hand over credentials using targeted, invoice-themed XLS.

cybersecurity malicious software microsoft microsoft research morse code phishing vulnerabilities


[Link] Conti ransomware affiliate goes rogue, leaks “gang data”

Read: 15/8/2021 nakedsecurity.sophos.com

If you like a touch of irony in your cybersecurity news, then this has been the week for it. And if that’s not enough to bring a wry smile to your lips, then there’s more.

cyber hacks cybercrime cybercrime community cybercrime infrastructure cybersecurity hacker groups internet malicious software ransomware sophos vulnerabilities


[Link] Discord malware is a persistent and growing threat warns Sophos

Read: 13/8/2021 www.pcgamer.com

A few weeks back, leading cybersecurity company Sophos issued a warning that Discord is becoming an increasingly common target for hackers.

cheats cybersecurity discord malicious software moderation social media sophos tech companies video game cheats video games vulnerabilities


[Link] How GrayShift Keeps its iPhone Unlocking Tech Secret

Read: 12/8/2021 www.vice.com

Grayshift, the company that develops that iPhone unlocking device GrayKey that is widely used by law enforcement, tries to keep details of its technology out of the broader public's hands.

cybersecurity iphones phone hacks privacy privacy circumvention vice.com


[Link] All your DNS were belong to us: AWS and Google Cloud shut down spying vulnerability

Read: 9/8/2021 www.theregister.com

Until February this year, Amazon Route53's DNS service offered largely unappreciated network eavesdropping capabilities. And this undocumented spying option was also available at Google Cloud DNS and at least one other DNS-as-a-service provider.

alphabet amazon aws cybersecurity dns google internet internet infrastructure microsoft privacy tech companies vulnerabilities


[Link] Black-Box Attacks on Perceptual Image Hashes with GANs

Read: 7/8/2021 towardsdatascience.com

A Perceptual image hash (PIH) is a short hexadecimal string (e.g. ‘00081c3c3c181818’ ) based on an image’s appearance. Perceptual image hashes, despite being hashes, are not cryptographically secure hashes.

ai algorithms cryptography cybersecurity hashing algorithms machine learning vulnerabilities


[Link] The Pegasus Project Shows Tech Giants Need to Do More to Keep Users Safe

Read: 5/8/2021 www.vice.com

Cybersecurity experts have been sounding the alarm about industrialized insecurity for years, but the Pegasus Project has to be a line in the sand. As you might have noticed, this newsletter was dormant for the last 6 months.

amnesty international apple cybersecurity google malicious software pegasus project privacy spyware surveillance tech companies twitter vice.com


[Link] With help from Google, impersonated Brave.com website pushes malware

Read: 3/8/2021 arstechnica.com

Scammers have been caught using a clever sleight of hand to impersonate the website for the Brave browser and using it in Google ads to push malware that takes control of browsers and steals sensitive data. The attack worked by registering the domain xn--brav-yva[.

brave browser cyber hacks cybercrime cybersecurity google ads internet advertising malicious software search engines tech companies vulnerabilities web browsers


[Link] Automation projects held back by security and data concerns

Read: 1/8/2021 betanews.com

A new report shows that 70 percent of automation initiatives are being hindered by security concerns and data silos, as organizations increasingly look to automation to improve efficiency and productivity.

automation cyber hacks cybercrime cybersecurity


[Link] Cybercriminals work together to drive greater profits

Read: 1/8/2021 betanews.com

Cybercrime is getting more organized than ever, as threat actors increase collaboration and adapt methods to drive greater monetization, selling access to breached systems to organized criminal groups and ransomware gangs.

cryptocurrency cyber hacks cybercrime cybersecurity organised crime ransomware


[Link] Feds list the top 30 most exploited vulnerabilities. Many are years old

Read: 31/7/2021 arstechnica.com

Government officials in the US, UK, and Australia are urging public- and private-sector organizations to secure their networks by ensuring firewalls, VPNs, and other network-perimeter devices are patched against the most widespread exploits.

cyber hacks cyberforensics cybersecurity microsoft vulnerabilities


[Link] Israeli authorities investigate NSO Group over Pegasus spyware abuse claims

Read: 30/7/2021 www.theregister.com

Israel's Ministry of Defense says the nation's government has visited spyware-for-governments developer NSO Group to investigate allegations its wares have been widely – and perhaps willingly – misused.

cyber hacks cybersecurity cyberwar israel malicious software middle east pegasus project spyware surveillance


[Link] NPM is Now Providing Malware – or was until recently

Read: 30/7/2021 www.theregister.com

Another malicious library has been spotted in the JavaScript-oriented NPM registry, underscoring the continued fragility of today's software supply chain.

code cyber hacks cybersecurity hacks malicious software microsoft module repositories nodejs npm software software development


[Link] Iranian state-backed hackers posed as flirty Scouser called Marcy to target workers in defence and aerospace

Read: 30/7/2021 www.theregister.com

Iranian state-backed hackers posed as a flirty Liverpudlian aerobics instructor in order to trick defence and aerospace workers into revealing secrets, according to a newly-published study.

applied seduction cyber hacks cybercrime cybersecurity cyberwar fake identity iran social engineering uk uk armed forces


[Link] From disaster to inconvenience — Zerto adds near-instant ransomware restore

Read: 30/7/2021 blocksandfiles.com

Disaster recovery specialist Zerto aims to deal with the corporate data cancer of ransomware by providing automated virtual machine protection, with restoration within seconds of an attack. Version 9.

cybersecurity malicious software products ransomware software


[Link] Malware for Macs Is Getting Bigger, More Dangerous, and It’s Dirt Cheap

Read: 28/7/2021 www.gizmodo.com.au

A disturbing element of modern cybercrime is just how easy it is to procure powerful and invasive tools — the kind that can wreak total havoc on an unsuspecting victim’s computer.

apple computer crime crime cyber hacks cybercrime cybersecurity malicious software malware operating systems osx web services windows


[Link] Most wanted: The top 5 online crime gangs running ransomware

Read: 27/7/2021 thenextweb.com

An independent news and commentary website produced by academics and journalists.

computer crime crime cyber hacks cybercrime cybersecurity hacker groups insider trading organised crime ransomware russia stock manipulation stock markets usa


[Link] How REvil Ransomware Took Out Thousands of Business at Once

Read: 27/7/2021 www.wired.com

A massive chain reaction on Friday infected at least hundreds and likely thousands of businesses worldwide with ransomware, including a railway, pharmacy chain, and hundreds of storefronts of Sweden's Coop grocery store brand.

cyber hacks cybersecurity it msps ransomware usa


[Link] Emmanuel Macron identified in leaked Pegasus project data

Read: 20/7/2021 www.theguardian.com

The leaked database at the heart of the Pegasus project includes the mobile phone numbers of the French president, Emmanuel Macron, and 13 other heads of state and heads of government, the Guardian can reveal.

android apple cybersecurity european union exploit companies france google government accountability government officials india ios lebanon morocco pakistan pegasus project rwanda south africa spyware tech companies uae


[Link] Why You Should Switch From Android Messages Given Security Concerns

Read: 18/7/2021 www.forbes.com

Somewhat ironically, , Google seems yet again to have slipped by unnoticed. Now, hundreds of millions of Android users need to decide who they trust with their data, given recent harvesting revelations. Android Messages is trying to fix the major security holes in its architecture.

android apple cybersecurity end to end encryption facebook google message services sms tech companies whatsapp


[Link] We Got the Phone the FBI Secretly Sold to Criminals

Read: 15/7/2021 www.vice.com

'Anom’ phones used in an FBI honeypot are mysteriously showing up on the secondary market. We bought one. Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet. See More → The sleek, black phone seems perfectly normal.

afp computer crime crime cybersecurity darknet fbi malicious software


[Link] Ransomware-hit law firm gets court order asking crooks not to publish the data they stole

Read: 12/7/2021 www.theregister.com

A barristers' chambers hit by a ransomware attack has responded by getting a court order demanding the criminals do not share stolen data.

computer crime crime cybersecurity hacks ransomware uk uk courts uk law


[Link] FBI to share compromised passwords with Have I Been Pwned

Read: 31/5/2021 www.bleepingcomputer.com

The FBI will soon begin to share compromised passwords with Have I Been Pwned's 'Password Pwned' service that were discovered during law enforcement investigations.

cybersecurity fbi leaked credentials


[Link] Morphing computer chip repels hundreds of professional DARPA hackers

Read: 29/5/2021 newatlas.com

Engineers have designed a computer processor that thwarts hackers by randomly changing its microarchitecture every few milliseconds. Known as Morpheus, the puzzling processor has now aced its first major tests, repelling hundreds of professional hackers in a DARPA security challenge.

computer architecture computer hardware computer science cybersecurity


[Link] This Guy Designed an Android App That Deletes All Your Phone's Data When Police Try to Crack It

Read: 19/5/2021 gizmodo.com

These days, if you’re arrested and charged with a crime, the first thing cops will likely try to do is look at the contents of your phone. Digital forensics is increasingly a favorite way to secure a conviction, or at least gain a broader understanding of a suspect.

android cyberforensics cybersecurity