Researchers at firmware and hardware security company Eclypsium discovered that hundreds of motherboard models made by Taiwanese computer components giant Gigabyte include backdoor functionality that could pose a significant risk to organizations. The backdoor was discovered by Eclypsium based on behavior associated with the functionality, which triggered an alert in …
Read More »Samsung Smartphone Users at Risk of Hacking, Update Now to Protect Yourself
Samsung smartphone users have been warned by the vendor and the US Cyber security and Infrastructure Security Agency (CISA) about a vulnerability that is being actively exploited in attacks. The vulnerability, which is tracked as CVE-2023-21492, is a kernel pointer exposure issue related to log files. It can allow a …
Read More »North Korean Hackers Stole Japan’s $721M Worth Crypto: Report | Coingape
North Korean hackers have stolen $721 million from Japan since 2017, accounting for 30% of the crypto thefts worldwide. According to a study by a U.K.-based compliance specialist, North Korea employs hacking and ransomware to steal crypto assets, especially in Japan, Vietnam and Hong Kong, the leading Asian crypto hubs. North Korean Hackers Eye …
Read More »CISA alarms of critical Ruckus bug used to infect Wi-Fi access points
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of a critical remote code execution (RCE) flaw in the Ruckus Wireless Admin panel actively exploited by a recently discovered DDoS botnet. While this security bug (CVE-2023-25717) was addressed in early February, many owners are likely yet to patch their …
Read More »LockBit 3.0 Leaks 600 GBs of Data Stolen From Indian Lender
The LockBit 3.0 ransomware group on Monday leaked 600 gigabytes of critical data stolen from Indian lender Fullerton India, two weeks after the group demanded a $3 million ransom from the company. Fullerton India said on April 24 that it had suffered a malware attack that forced it to temporarily operate offline …
Read More »MSI’s leaked firmware keys endanger hundreds of devices
MSI attackers leaked the company’s firmware image signing keys, a crucial component for differentiating between legitimate and malicious updates. Over 200 MSI products are believed to be exposed. Researchers have identified leaked firmware image signing keys and Intel’s BootGuard for MSI products. According to Alex Matrosov, CEO of firmware supply …
Read More »T-Mobile Says Personal Information Stolen in New Data Breach
US wireless carrier T-Mobile is informing some customers that their personal information was compromised in a recent data breach. After being alerted to unauthorized activity on its systems, the company discovered that a malicious actor had access to a “small number” of T-Mobile accounts between late February and March 2023. …
Read More »BlackCat Trolls Western Digital With Leaked Response Meeting Image
The ransomware actor–threat hunter relationship just got extremely personal. The BlackCat gang decided to add the professional reputations of the Western Digital cyber-incident response team to the hit list when it hacked into its early morning videoconference convened to discuss the recent ransomware attack against the company. The ransomware group then …
Read More »Android phone chip provider was secretly collecting user data
A multinational Qualcomm corporation that manufactures wireless telecommunications hardware has allegedly been secretly collecting private user data. Chips made by Qualcomm are used in around a third of all Android devices, including Samsung and also Apple smartphones. Qualcomm’s technology is used in various mobile devices, including smartphones, wearables, as well …
Read More »India Cosmos Bank Cyber Attack – 11 Accused in Cyber Fraud Case
The Cosmos cooperative bank in Pune, among the city’s oldest urban cooperative banks, has fallen prey to cyber fraudsters. Hackers gained access to the bank’s system and stole Rs 94 crore. A court in Maharashtra’s Pune had found 11 persons guilty. Fahim Shaikh and Mohammad Saeed Iqbal Hussain Jafari of …
Read More »