Windows vulnerability that allows anyone to gain admin privileges

An exploit for a Windows local privilege elevation vulnerability that allows anyone to gain admin privileges in Windows 10 has been publicly disclosed by a security researcher. Threat actors who had access to a compromised device could elevate their privileges to spread laterally within the network, create new administrative users, or perform privileged commands. What …

Malware infested app On Google Store Disguised As A 2FA App Actually Steals Your Financial Data

On the 24th of January, 2022, A French mobile-security firm known as Pradeo came out with a statement regarding a 2FA app that surfaced on the google play store. This app which is disguised as a 2FA authentication app was injected with a malware called the “Vulture stealer malware” that had the ability to steal …

Finance platform Qubit Finance lost cryptocurrency worth $80 million to hackers!

On the 27th of January 2022, Qubit Finance tweeted about the biggest DeFi (Decentralized Finance) exploits of 2022 which resulted in them losing $80 million dollars of cryptocurrency in the form of 206,809 Binance coins. https://twitter.com/QubitFin/status/1486870238591594497?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1486870238591594497%7Ctwgr%5E%7Ctwcon%5Es1_&ref_url=https%3A%2F%2Fwww.ndtv.com%2Fbusiness%2Fcryptocurrency-worth-80-million-stolen-from-defi-platform-qubit-finance-2737888 What is Qubit Finance? Qubit is a decentralized money market platform that takes advantage of the speed, automation, and …

Fake websites “Hiring” Former Spies to Seemingly work for Israel

In the past four years, 16 websites appeared in Iran, Lebanon, and Syria in an attempt to lure those interested in spy/consulting work for Israel. They specifically targeted those who had sensitive security jobs in the Hezbollah group, the Assad regime, and in Iran. These sites were using the same website structures such as logos, …

$770 Million Lost to Social Media Scams

Social media scams were reported as a quarter of the frauds in the 2021 fraud losses report in the United States. Ages 18-39 are the ones who are the majority which makes up this group of individuals scammed larger on Facebook and Instagram. [2] This is the highest reported amount of cases for fraud up …

Canadian Foreign Affairs Ministry HACKED!

On the 25th of January 2022 CNN reports an unpleasant news for the public.2 Claiming that there has been a cyberattack on the foreign affairs ministry of Canada also known as Global Affairs Canada (GAC), causing disruption to internet – based activities. What is Global Affairs Canada? In order to fully explain the magnitude of …

Apple Created the Perfect Tool for Stalking and Phishing Attacks

What are Apple AirTags and How Do They Work? Apple advertised the AirTags as a smart tracking device. It is an easy way to keep track of your belongings and help those who have misplaced or had their items stolen. These devices can be attached to your personal belongings, some of the most common options …

The Importance of Drone Security

As our civilization continues to advance through the age of information, drones technology becomes ever more prominent within our daily lives. Considering that drones are rapidly growing in popularity, its functions could include but are not limited to the production of recreational art, automated labor, or even forms of weaponry[1]. Their uses can be found …

Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing.

As we know technology has been increasing and there have been various advantages like you could save your information in security apps so next time when you open it ; it would be easily accessible and would save time and almost everybody would rely on their electronic gadgets by saving their bank information, personal data …

Security is an Evolutionary Arms Race

Anyone who keeps up to date with technology is likely very familiar with software updates. Generally speaking, updates are considered good things, delivering new features, fixing glitches, optimizing how a program runs, or closing security exploits. It follows of course that malicious software also receives updates, although coverage of those is more sparse, partially due …