Meta Says Hacking Group Sent Bogus Ukrainian Surrender Messages

hacker-110

According to a recent security investigation by Meta, a Belarus-aligned hacking group attempted to get access to Ukrainian military personnel’s Facebook accounts and broadcast videos calling for the Ukrainian army to surrender using hijacked accounts. The hacking attack, dubbed “Ghostwriter” by security researchers, was carried out by a group known as UNC1151, which according to … Read more

Does College Degree Matter in Cybersecurity?

college-degree-cyber-sec-01

Cyber security is one of the vital elements of the modern world dominated by computer and digital technology. At the same time, it’s one of the most demanded areas of computer science, with cyber security specialists earning quite considerable amounts. At the same time, such a specialist must walk the path of a true computer … Read more

Hackers Use Mailchimp Email Marketing Firm to Launch Crypto Phishing Scams

crypto-phishing-mailchimp-01

According to a revelation by Bleeping Computer, Mailchimp, an email marketing provider, was hacked on March 26th. When a customer support tool was hacked, the organization became aware of the hostile occurrence. Mailchimp was bought by Intuit, a financial software company, in September 2020. Mailchimp says it was hacked. According to Siobhan Smyth, their chief … Read more

Brokenwire Exploit Could Disrupt Electric Vehicle Charging

electric-car-01

Remote attackers might use the Brokenwire exploit to disrupt electric vehicle charging. According to a new study from the University of Oxford and Armasuisse S+T, a mechanism for attacking a common charging system has been discovered, which might cause significant issues for electric vehicles. The “Brokenwire” strategy compels the automobile to cancel its charging session … Read more

Supply Chain Issues in The PHP Package Management PEAR

php-pear-01

For 15 years, supply chain issues in the PHP package management PEAR went unnoticed. PEAR was vulnerable to attack due to a cryptographic vulnerability and a problem in an out-of-date dependency. According to security experts, attackers could have caused havoc on the PHP ecosystem by exploiting a pair of long-standing vulnerabilities in package management PEAR … Read more

Browser-in-the-Browser Technique Being Used In Ukraine Hacking Attacks

browser-in-the-browser-2

A Belarusian threat actor that is known as Ghostwriter (aka UNC1151) has been observed leveraging a browser-in-the-browser technique. This method simulates a browser window in order to launch convincing social engineering campaigns. The Ghostwriter hacking group has used this technique, which masquerades as a legitimate domain by simulating a browser window over the website, to … Read more

What is a Decentralized VPN (dVPN)?

A decentralized VPN is better than conventional VPNs. A decentralized VPN, or dVPN, is an internet-based software application that connects two or more  It’s key to note that a dVPN is different from a traditional VPN because it’s not based on a centralized server. Now let’s talk about the advantages of dVPNs relative to traditional … Read more

Anonymous Hacks Roscomnadzor 820GB Worth of Data Leaked

anonymous-hacks

Anonymous, a collective of hackers and activists, reportedly hacked the Russian telecoms agency Roscomnadzor, which censors pirate sites and media. The breach leaked 820GB worth of data, which has yet to be analyzed. Anonymous claims it obtained 360,000 files from the servers. Although it’s too soon to know for sure, this hack may have revealed … Read more

Stats Widget Hacked in Attempt to Breach Russian Government Websites

Stats-Widget

Russian authorities say they prevented a cyber-attack by fixing an exploited widget. The Russian Ministry of Economic Development, a state-run organization, developed the widget. On March 8th, it was hacked and installed on government websites. The authorities were quick to realize the threat and fix it. The attacks were quickly localized, but the incident resulted … Read more