Your cart is currently empty!
Author: Omar
-
Avast will be prohibited by the FTC from selling browsing information for commercial use.
Avast will be ordered to pay$ 16. 5 million by the U. S. Federal Trade Commission (FTC ) and prohibited from licensing or selling users ‘ web browsing data for commercial purposes. According to the complaint, Avast violated the rights of millions of consumers by collecting, storing, and selling their browsing information without their knowledge…
-
Bring us LockBit’s head, please! For information on the infamous ransomware gang’s leaders, a$ 15 million bounty has been offered.
For information that identifies or locates any of the LockBit ransomware gang’s leaders, a sizable reward is being offered. The US State Department has made the bounty offer in response to the criminal organization’s activities being disrupted this week. Since its inception in 2020, LockBit has targeted thousands of victims worldwide, costing billions of dollars…
-
Post-Quantum Encryption for iMessage
Apple Unveils PQ3 Protocol Newsroom Quantum Computing and Encryption, February 22, 2024 In order to protect the messaging platform from future attacks brought on by the threat of a real-world quantum computer, Apple has announced the release of the PQ3 post-quantum cryptographic protocol, which it claimed will be integrated into iMessage. PQ3 is the first…
-
US mobile subscribers are impacted by a large AT&, T outage.
Update: All affected customers now have access to AT&, T’s restored wireless service, but the reason why has not been made public. On Thursday morning, tens of thousands of U.S. customers from AT&, T-Mobile, and Verizon voiced their displeasure with the lack of wireless service or service interruptions. It appears that both incoming and outgoing…
-
Customers of Verizon and T-Mobile are also affected by a large AT&, T outage.
On Thursday morning, tens of thousands of U. S. customers from AT&, T-Mobile, and Verizon voiced their displeasure with the lack of wireless service or service interruptions. It appears that both incoming and outgoing calls, including those to the 911 emergency service, have been impacted. a widespread emergency More than 73, 000 AT&, T customers…
-
Before being taken down, LockBit ransomware was secretly developing a next-generation encryptor.
When law enforcement demolished the cybercriminal’s infrastructure earlier this week, LockBit ransomware developers were secretly creating a new version of their file encrypting malware, known as LockLit NG-Dev. This version is probably going to become LockSlot4. 0. Trend Micro examined a sample of the most recent LockBit development, which can function on various operating systems,…
-
Cybercriminals Using Open-Source SSH-Snake Tool for Network Attacks as a Weapon
NewsroomNetwork Security/Penetration Testing, February 22, 2024 Threat actors have used the recently open-sourced network mapping tool SSH- Snake to carry out malicious activities. According to Sysdig researcher Miguel Hernández,” SSH-Snake is a self-modifying worm that starts spreading itself throughout the network by exploiting SSH credentials found on an compromised system.” ” To determine its next…
-
Hacktivism in the New Age
In the past 2 years, we have observed a significant surge in hacktivism activity due to ongoing wars and geopolitical conflicts in various regions. Since the war against Ukraine began, we have witnessed a notable mobilization of non-state and state-backed actors alike, forming new groups or joining existing hacker collectives. We understand hacktivism as a…
-
Konni RAT malware is used by Russian government software that is backdoored.
NewsroomMalware/Cyber Espionage, February 22, 2024 A remote access Trojan called Konni RAT ( also known as UpDog ) has been backdoored by an installer for a tool that is probably used by the Ministry of Foreign Affairs ‘ ( MID ) Russian Consular Department. German cybersecurity firm DCSO published the findings and claimed that the…
-
NordVPN for Torrenting: Your Guide to Safe and Fast Downloads
Is NordVPN the Best VPN for Torrenting? Here’s the Answer Using a reliable VPN is crucial to ensure privacy and security when torrenting. NordVPN provides a fortified shield against cyber threats and offers a seamless P2P file-sharing experience, making it the top choice for torrents. The Critical Role of a Torrenting VPN Torrenting…