-
Web Applications
Magento Based Stores See Biggest Attack Due to 0day flaw
Well-known cybersecurity expert and founder of Sanguine Security (SanSec) Willem de Groot (Willem de Groot) warned of the largest ever campaign aimed…
-
Darkweb
Dream Market Vendor “Rackjaw2” Sentenced to Prison
A 52-year-old from Everett, Washington, was sentenced to four years in prison for selling methamphetamine and heroin on the darkweb.…
-
Darkweb
Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
Federal investigators identified a darkweb opioid dealer by linking Bitcoin transactions to the dealer’s home I.P. address. Daren James Reid,…
-
Fraud
Fake SpaceX Youtube Channels Defraud 150,000 in Bitcoin
Journalists at Bleeping Computer warned that the scammers recently seized three YouTube channels, gave them new names associated with SpaceX, and then…
-
The Deep Web
Commodified Cybercrime Infrastructure: Exploring the Underground Services Market for Cybercriminals
Cybercriminal takeover The server takeover is the earliest stage, where exposed assets are enumerated (i.e., via network scanners), accessed, and…
-
The Deep Web
Securing Enterprise Security: How to Manage the New Generation of Access Control Devices
Trend Micro Research Given the increasing use by enterprises of contactless security solutions, the security of the devices that themselves…
-
Phishing
OX App Suite / OX Guard / OX Documents SSRF / Cross Site Scripting
Authored by Martin Heiland Open-Xchange OX App Suite, OX Guard, and OX Documents suffer from server-side request forgery and cross…
-
Phishing
Attackers Exploited 4 Zero-Day Flaws in Chrome, Safari & IE
At least two government-backed actors — including one Russian group — used the now-patched flaws in separate campaigns, Google says.…
-
Cloud Security
6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
Container-based application deployment is at its peak, as is the popularity of orchestration platforms like Kubernetes that form the underlying…