Similar Posts
Signal Founder Hacks Cellebrite’s Phone Hacking Tools
This site may earn affiliate commissions from the links on this page. Terms of use. The secure lock screens on Android and iOS devices are supposed to keep your data secure, but there are still some ways to crack the lock. You just need a capable digital crowbar like the ones made by Cellebrite. The…
Microsoft Exchange attacks increase while WannaCry gets a restart
The recently patched vulnerabilities in Microsoft Exchange have sparked new interest among cybercriminals, who increased the volume of attacks focusing on this particular vector. While ransomware attacks have increased in frequency in the past six months, cybersecurity company Check Point last week noticed a surge in incidents targeting Microsoft Exchange servers vulnerable to the so-called…
Google removes popular Android apps that stole Facebook passwords
Google is still racing to pull Android apps that commit major privacy violations. Ars Technica notes that Google has removed nine apps from the Play Store after Dr. Web analysts discovered they were trojans stealing Facebook login details. These weren’t obscure titles — the malware had over 5.8 million combined downloads and posed as easy-to-find…
NATO summit to spell out united response to cyber attacks
Biden is focused on building a more cohesive bond between America and allies who had become wary of US leadership after enduring four years of Trump’s name-calling and frequent invectives about the relevance of multilateral alliances like NATO. Loading The last administration was at odds with some leading NATO members, including Britain, Germany and France,…
The Rise of Hydra Dark Web Marketplace and Its Cryptocurrency Ecosystem
According to new research published by Flashpoint analysts, Hydra marketplace has revealed increasing transaction volumes and a booming cryptocurrency ecosystem. The Russian dark web marketplace, mainly known for its illicit, high-traffic narcotics market, is now conducting illegal sales of stolen credit cards, SIM cards, counterfeit documents, and IDs, as well as covering its own digital…
CISA: Patch These Three Fortinet Bugs Now to Avoid Compromise
The US authorities are urging Fortinet customers to patch three legacy vulnerabilities being exploited in the wild to compromise government, commercial and technology service provider networks. A joint cybersecurity advisory from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) on Friday warned that threat actors are actively scanning for devices via ports 4443, 8443 and…

