Once it required a level of technical skill, practice and hardware resources to carry out successful cyber attack that would make (illicit) money. Now researchers have discovered and easy to use framework that enables any would be hacker to craft sophisticated attacks, deploy them, steal information and monetise them: New …
CISA issues a notice on Adobe security updates
The US Cybersecurity and Infrastructure Security Agency has issued an advisory on various Adobe products: Adobe Releases Security Updates for Multiple Products | CISA
Hi-Tech Peeping Tom
Readily available commercial drones have been adapted to be spy-drones: Wi-Fi spy drones used to snoop on financial firm • The Register This type of attack had been a popular discussion and maker session at various hacking events over the past few years, but now it is happening in the …
Who are the targets for phishing campaigns?
The threat actors will go after anyone who they can exploit, steal credentials from, or who has something the criminal wants! In this case it is workers for the forthcoming US elections. This one is targetting people in a privileged position: US election workers hit with phishing, malware emails • …
Continue reading “Who are the targets for phishing campaigns?”
CISA adds two vulnerabilities to the Known Exploited Vulnerabilities Catalog
The release says one vulnerability, but if you check there are two, for Microsoft and Fortinet. CISA Has Added One Known Exploited Vulnerability to Catalog | CISA
