Zephyrnet Logo

Tag: BleepingComputer

Ransomware Hackers Attack Belgian Police Station, Steal Crime Files

Colin Thierry Published on: November 29, 2022 Ragnar Locker ransomware hackers attacked a police station in Antwerp, Belgium and...

Circle Warns About Scammers Baiting USDC Users

Circle, the firm behind USDC stablecoin, issued a warning about an active phishing campaign attempting to lure users into transferring tokens to malicious...

EU Parliament Site Taken Down in DDoS Attack

Colin Thierry Published on: November 25, 2022 The website of the European Parliament was taken down following a...

DraftKings Accounts Targeted and Compromised in Credential Stuffing Attack

Colin Thierry Published on: November 23, 2022 DraftKings admitted on Monday that some of its customers were targeted in...

This is the second time a third-party patcher has stepped in to fix the same Windows security issue

Windows local privilege escalation zero-day vulnerability, has a new unofficial fix, again.

Torguard Settles Piracy Lawsuit and Agrees to Block Torrent Traffic on U.S. Servers

TorGuard has settled a copyright infringement lawsuit filed by several movie companies last year. The VPN provider stood accused of failing to take action against subscribers who were pirating films. As part of the settlement, TorGuard agrees to block BitTorrent traffic on U.S. servers; however, it stresses that user privacy is in no way affected by this decision.

From: TF, for the latest news on copyright battles, piracy and more.

Samsung Confirms Data Breach After Hackers Leak Galaxy Source Code

Samsung on Monday confirmed a security breach that resulted in the exposure of internal company data, including the source code related to its Galaxy smartphones. "According to our initial analysis, the breach involves some source code relating to the operation of Galaxy devices, but does not include the personal information of our consumers or employees," the electronics giant told Bloomberg.

Beware fake Nvidia drivers, leaked certificate code from hack may now have malware

Nvidia drivers malwareThe fallout continues from the ransomware attack that targeted Nvidia, as it has been discovered that some of the company’s older GPU drivers can now conceal malware. According to TechPowerUp, stolen code-signing certificates are being used to place malware on unsuspecting PCs. This was also confirmed by @BillDemirkapi on Twitter. The code-signing certificates expired in 2014 and 2018, but that doesn’t stop Windows from recognizing these as legitimate. And this could be a massive issue for those who aren’t sure what to look out for. BleepingComputer pointed out the kinds of malware making the rounds. These include Cobalt Strike Beacons, Mimikatz, backdoors, and Remote Access Trojans. This is clearly a problematic situation for Nvidia, and it’s unknown how much worse the situation could become in the next few weeks. But for now, it’s important that users remain vigilant for anything that seems out of the ordinary. Particularly when it comes to downloadin...

Cyber‑readiness in the face of an escalated gray zone conflict

Organizations worldwide should remain on high alert for cyberattacks as the risk of major cyber-spillover from the crisis in Ukraine continues to loom large

The post Cyber‑readiness in the face of an escalated gray zone conflict appeared first on WeLiveSecurity

Stolen Nvidia certificates used to hide malware in driver downloads

Nvidia hackers have now targeted Samsung

Samsung has reportedly been hacked by the same group that attacked Nvidia last week.

According to Bleeping Computer, the hacking group has released almost 190 GB of confidential data and code from a number of Samsung projects, including biometric data, source code for Samsung's activation servers, and "full source code for technology used for authorising and authenticating Samsung accounts".

Read more

Nvidia hackers target Samsung, release 190GB of sensitive data

The hacker group Lapsus$ has not yet made public demands like they did with Nvidia.

Latest Intelligence

spot_img
spot_img