data theft

  1. Father

    GitCaught: Downloading programs on macOS can lead to data theft

    The campaign shows why it is harmful to pirate on Apple equipment. According to an Insikt Group report, cybercriminals are abusing GitHub and FileZilla to deliver infostilers and Trojans disguised as macOS programs-1Password, Bartender 5, and Pixelmator Pro. The campaign is called GitCaught...
  2. Father

    Espionage and data theft: Xiaomi and Google urgently update software due to problems in smartphones

    Companies respond to vulnerabilities after specialist intervention. Cybersecurity company Oversecured has discovered problems in Android applications from Xiaomi and the Google Android Open Source Project (AOSP) affecting users around the world. The study identified 20 vulnerabilities related...
  3. Father

    Rhadamanthys is back: Traffic accidents have become a new bait for data theft

    Even simple phishing schemes can be effective if they appeal to human weaknesses. An updated version of the malicious information-stealing software called Rhadamanthys is being used in phishing campaigns targeting the oil and gas sector. Cofense cyber expert Dylan Duncan reports that hackers...
  4. Teacher

    RisePro: hacked software on GitHub has become a reliable cover for data theft

    CCleaner, Daemon Tools and AVAST were successfully used as bait for fans of "free cheese". Security researchers have discovered several repositories on GitHub that distribute malware under the guise of hacked versions of popular software. As part of a malicious operation dubbed "gitgub"...
  5. Teacher

    Wireless Charging: A hellish cocktail of Overheating, Fire, and Data Theft

    How a newfangled technology can turn your home into ashes. In a new study conducted by a team of academic researchers from the University of Florida in collaboration with CertiK, a number of security threats related to the use of wireless chargers for smartphones were discovered. Researchers...
  6. Brother

    AutoSpill: All existing password managers are susceptible to data theft

    A study by Indian experts revealed a fundamental problem in Android security. At the Black Hat Europe was presented. Indian researchers at the International Institute of Information Technology in Hyderabad have found that most Android password managers are vulnerable to this attack, even...
  7. Carding 4 Carders

    New cyber threat threatens Chinese government agencies with data theft

    Hackers use several types of attacks for each individual case. In recent months, the Chinese information space has seen an increase in the activity of cyber attacks aimed at critical infrastructure facilities. One of the most disturbing phenomena was the discovery by experts from the Fuying Lab...
  8. Carding 4 Carders

    Data theft is inevitable: even updates can't save Citrix from exploiting errors

    This is the case when hotfixes are not the only security measure. Citrix warns about the use of a recently discovered critical vulnerability in NetScaler ADC and Gateway devices, which can lead to the disclosure of confidential information. The flaw identified as CVE-2023-4966 (CVSS: 9.4) was...
  9. Carding 4 Carders

    Confucius Attacks: how ancient teachings turned into data theft in Asia

    A group of hackers with extensive experience continues their attacks, bypassing the protection and attention of victims. According to a report by Anheng, the Confucius group (APT59) is attacking government and military structures in South and East Asia. Recently, experts discovered a new...
  10. Carding 4 Carders

    Error 404 has become a new tool for cyber attacks and data theft

    Customers of online stores have already tried out a new method of stealing funds. Cybersecurity researchers from the Akamai Security Intelligence Group have discovered a new campaign for skimming Magecart maps. Attackers use 404 error pages on online store sites to place malicious code that...
  11. Carding

    Data theft

    Data theft is the unauthorized extraction of information from its storage locations, which is usually carried out by hacking network resources. The volume and value of data increases every year, and with them the number of thefts inevitably increases. Cybercriminals steal information from...
Top