Nair previously worked at TechCircle, IDG, Times Group and other publications, where he reported on developments in enterprise technology, digital transformation and other issues.
Fake gains in fake cryptocurrency investment accounts are meant to keep victims participating in a scam known as "pig butchering," which is a mounting threat in English-speaking countries. The scam begins with cultivation of an intimate online relationship.
Researchers from cybersecurity firm Eset found a variant of Android stalkerware dubbed FurBall slightly modified in a semi-successful bid to evade detection. The malware, dubbed FurBall, is a tool used by a hacking group linked to the Iranian government.
Security researchers spotted a previously undetected PowerShell backdoor disguising itself as part of the Windows update process that appears to have infected at least 69 victims. When SafeBreach Labs ran obfuscated scripts downloaded by the backdoor through VirusTotal, they came back as clean.
A European ring of auto thieves used software branded as a diagnostic tool to perform fobless thefts of cars made by two French manufacturers. It looks as if the thieves found a vulnerability in the electronic control unit governing the authorization of new key fobs.
Decentralized finance exchange Mango Markets is set to pay $47 million as a bug bounty to the hacker who stole $117 million in digital assets on Wednesday, after 96% of the governance voted in favor of the deal. Mango Markets is a trading platform riding on the Solana blockchain.
Probe deep enough into a once-obscure subsystem in the Windows operating system called the Common Log File System and you might come out the other end with system privileges. Researchers on Zscaler’s ThreatLabz research team say the root cause of a recent CLFS zero-day resides in base file metadata.
Cybersecurity firm Eset says its spotted multiple hacks in Israel coming from a Lebanese threat group dubbed Polonium that's affiliated with Iran. The group employs custom-coded backdoors that use a slew of cloud storage accounts to handle command and control.
One zero-day down but two Microsoft Exchange zero-days to go in this month's dose of patches from the Redmond, Washington computing giant. Microsoft fixed a COM+ flaw being exploited in the wild but for now is relying on workarounds for two known email server bugs.
Self-proclaimed Russian hacktivist group KillNet took responsibility for distributed denial-of-service attacks launched against the public websites of several U.S. airports. It emerged in the wake of Russia's invasion of Ukraine and in May tried to stop online voting for the Eurovision Song Contest.
Australian fruit and vegetable supplier Costa Group says it was subjected to a malicious and sophisticated phishing attack in August that resulted in unauthorized access to its servers. The company, listed on the Australian Securities Exchange, says that the attack occurred on Aug. 21.
Count Log4Shell among Chinese hackers' favorite vulnerabilities, federal agencies say in a compilation of top exploits used by Beijing for state-sponsored cyber theft and espionage. Chinese state-sponsored hacking remains "one of the largest and most dynamic threats," warn the FBI, NSA and CISA.
The U.S. Department of Defense uncovered almost 350 vulnerabilities in the department's networks as part of its experimental bug bounty program launched on American Independence Day. The weeklong bug bounty challenge called "Hack U.S." ran from July Fourth to July 11.
Hackers, possibly Chinese, are exploiting Microsoft Exchange zero-day vulnerabilities to apparently implant backdoors and steal credentials. The computing giant says it doesn't yet have a patch, telling systems administrators to instead implement workarounds.
Hackers may shift malware attacks into technical environments beyond the reach of endpoint detection and response, says Mandiant. The threat intel firm says it uncovered a novel malware family targeting VMware hypervisors and virtual machine appliances.
A new malware dropper uncovered by Kaspersky targets would-be users of pirated software with a slew of nasty infections including backdoors, Trojan-Banker programs, downloaders, spyware and more. The cybersecurity company calls the dropper "NullMixer."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.