SS7 Exploit Service Providers on The Dark Web are Fake

In Signalling System No. 7 or SS7 back in 2016, the cybersecurity researchers warned of vulnerabilities in it, and as a result, just a year later, the SS7 attacks turned real ones from theoretical. To track individuals abroad the government-sponsored hackers exploited vulnerabilities in SS7 in the subsequent years. And not only that even the […]

The newer cybercrime triad: TrickBot-Emotet-Conti

Advanced Intelligence researchers argue that the restarting of the Emotet botnet was driven by Conti ransomware gang. Early this year, law enforcement and judicial authorities worldwide conducted a joint operation, named Operation Ladybird, which disrupted the EMOTET botnet. At the time the investigators have taken control of its infrastructure in an international coordinated action. This operation was […]

Development of a Smart Home Using AI and IoT Technologies

Personalization and automation remain the main directions for improving the quality of the user experience. They also help make the lives of millions of people safer, more convenient, and more comfortable. Artificial intelligence (AI) and the Internet of Things (IoT) have become the main tools in recent years. It is with their help that a […]

US and Israel Agree Anti-Ransomware Coalition

The US and Israel yesterday announced a new bilateral partnership designed to tackle ransomware. The move comes as part of the new US-Israeli Task Force launched on Sunday slated to cover Fintech Innovation and Cybersecurity more broadly. Its participants are currently working on a Memorandum of Understanding (MoU) to support joint activities, including information sharing in threat […]

FBI email server hack was down to “poor code”

Flaw has been identified and fixed, claims the FBI (Image credit: Sendinblue) Hackers claim that it was insecure code in a Federal Bureau of Investigation (FBI) portal designed to share information with state and local law enforcement authorities that they abused to send thousands of fake emails. The hackers were able to distribute spam email […]

DDoS attacks in Q3 2021

News overview Q3 2021 brought two new DDoS attack vectors, potentially posing a serious threat, including for major web resources. A team of researchers from the University of Maryland and the University of Colorado Boulder found a way to spoof the victim’s IP address over TCP. To date, amplification attacks have mostly been carried out […]

Interpol Hunts for Remaining Clop Ransomware Members

INTERPOL is still on the hunt for two suspected members of the Clop ransomware gang after making multiple arrests in the summer following a 30-month operation, it has revealed. In an update on Operation Cyclone, the law enforcement agency said that the two Red Notices had been circulated to all 194 member countries around the world following […]

McAfee to be taken private by Advent-led group in $14 billion deal

Nov 8 (Reuters) – McAfee Corp (MCFE.O) said on Monday a consortium led by U.S. private equity firm Advent International will take the cyber security company private in a $14 billion deal. The deal comes as a pandemic-driven shift to remote working and a rise in cyber attacks have spurred demand for antivirus and digital […]

This could be a great time to patch your Linux kernel

Patch to address significant security bug has been released (Image credit: Shutterstock) Cybersecurity researchers have helped fix a critical heap-overflow security vulnerability in the Linux kernel that could be exploited either locally or through remote code execution (RCE) to compromise the vulnerable Linux computers. Discovered by SentinelLabs’ researcher Max Van Amerongen, the vulnerability tracked as […]

Chinese APT Group Compromised Healthcare Organizations by Exploiting Zoho Password Management Platform Flaw

An advanced persistent threat (APT) actor has been conducting an espionage campaign that has seen the systems of at least 9 organizations compromised. The campaign targeted organizations in a range of critical sectors, including healthcare, energy, defense, technology, and education. It was identified by security researchers at Palo Alto Networks and while the identity of […]