CVE-2021-37708
CVE-2021-37708
Victor Gevers describes himself and other ethical hackers as a ‘volunteer fire brigade’ for the internet. When a massive cyberattack took out everything from Swedish supermarkets to New Zealand kindergartens this month, a group of Dutch ethical hackers breathed a collective sigh of frustration. They had been so close to stopping it. If the Dutch…
A new cyber campaign has come to known as a phishing attack. Outlook Web Access and Office 365 services users are being targeted. The campaign collected the credentials of thousands of customers relying on trusted domains such as SendGrid. The campaign named “Compact”, the Cyber actors behind these phishing attacks have been operating this…
No one likes passwords because of the inconvenience, and they are the very prime target. From the year’s security is a most crucial part of digital lives like email, bank account, video games, shopping cart, etc. This is expected that everyone creates a unique and complex password, and remembers them. Very frequently, they also need…
Japanese cryptocurrency exchange Liquid says hackers have compromised some of its wallets and stolen more than $90 million. The firm’s operations and technology teams detected unauthorised access to “warm” wallets early Thursday. Warm wallets are based online. Crooks took over $91 million in crypto assets, of which just over $16 million was frozen thanks…
Cybercrime , Data Loss Prevention (DLP) , Endpoint Security 1.5 Million Facebook Passwords Among Leaked Data; Raccoon Infostealer Suspected Jeremy Kirk (jeremy_kirk) • June 10, 2021 A control panel for the Raccoon infostealer botnet, where subscribers can browse data stolen from compromised computers (Source: Hold Security) There’s such a surfeit of stolen data…
New link to Tehran: Facebook cyber experts determined that some of the hackers’ malware was developed by the Iranian IT company Mahak Rayan Afraz, which has ties to Iran’s Islamic Revolutionary Guard Corps. “As far as I know, this is the first public attribution of the group’s malware to a vendor or front company with…