By Azeezat Lawal, Dami Ogunnupebi, Tarun Sidhu, Pradip Ghimire, Abdul-Hafis Osuwa Walkthrough Teaching Aide Supplementary Documentation Questions
Category Archives: ISEC 601
WEMIX Suffers $6M Cyberattack: What Happened and What It Means
On March 4, 2025, WEMIX, a blockchain gaming platform, revealed that they were a victim of a cyberattack. This breach resulted in a loss of more than $6 million of their cryptocurrency assets and raised concerns about their security practices, especially on the developer side. What is WEMIX? WEMIX, a subsidiary of South Korean game …
Continue reading “WEMIX Suffers $6M Cyberattack: What Happened and What It Means”
Confederation of the UNCs – A Brief Look into A Series of the Salesforce Data Theft Exploit
CAUTION: This post is most-likely riddled with a prematurely conceived notion of someone who thinks they can fix cybersecurity for the defenders (we have a lot of those, don’t we?), but hear me out and approach this from the point of view of someone who genuinely wants to work with another person (and another person, …
SlopAds Campaign – 224 Malicious Apps Found in Google Play Store
What Happened? Security researchers from HUMAN’s Satori Threat Intelligence team were able to discover a massive ad fraud campaign that was being distributes through over 200 mobile apps available in Google Play Store. They named the whole campaign “SlopAds”, to signify the mass-production of malicious apps and the use of generative AI throughout the campaign. …
Continue reading “SlopAds Campaign – 224 Malicious Apps Found in Google Play Store”
Is the EU about to start scanning your text messages?
Imagine you’re sending a secret message, and suddenly someone decides to check what you’re writing. Strange, right? That’s essentially what’s unfolding in Europe right now. The EU is debating a controversial new plan, known as the “Chat Control” law, which would require messaging apps—including privacy-focused services like WhatsApp, Signal, and iMessage—to scan every user’s chats …
Continue reading “Is the EU about to start scanning your text messages?”
When Hackers go North!
House of Commons of Canada Data Breach via Microsoft Vulnerability (August 2025) Figure 1: Cyberattack illustration of Canada’s Parliament (image generated by ChatGPT). If you think hackers only go after banks or tech companies then think twice. Turns out, they have a thing for Parliaments too. According to a CBC News report, in August 2025 Canada’s House …
The Fortinet Data Breach: A Deep Dive into the Recent Cybersecurity Incident
Cybersecurity breaches are becoming increasingly common in a world where there is a significant increase in digital infrastructure. Fortinet, a key player that provides cybersecurity solutions, recently faced a security breach. This breach, which took place over a few months, has gained significant attention in the cybersecurity community. What Happened? Early in September 2024, Fortinet …
Continue reading “The Fortinet Data Breach: A Deep Dive into the Recent Cybersecurity Incident”
Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.
Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …
Continue reading “Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.”
Ransomware as a Service, Kryptina resurfaces in recent enterprise attacks by Mallox
Kryptina, once an overlooked free to use Ransomeware as a service available in dark web has resurfaced in recent enterprise attacks. [4]Its return has been marked by an advanced and potent version as per research presented by SentilLabs in LABScon 2024 reported by infosec-magazine. Mallox Linux 1.0 Mallox Ransomware Group also known as , a …