Robert Abel SC Media | Page 2 of 190

Robert Abel

Content Coordinator/Reporter

Most recent articles by Robert Abel

GateHub hit for $9.5 million worth of cryptocurrency

The cryptocurrency wallet service GateHub was hit by a cyber heist that netted 23.2 million Ripple coins (XRP), worth nearly $9.5 million. The incident is still under investigation, but researchers at the firm believe the hacker abused its API to carry out the attacks, albeit it is unsure how. “We have however detected an increased…

IRS

IRS warns users of post-tax season phishing scams

The IRS once again is warning taxpayers to be on the lookout for phishing scams even after tax season has ended. The agency has identified two new variations of tax related scams with one threatening to cancels a victim’s social security while the other claims to threaten victims with an IRS lien or levy, according…

IoT risks become intimate after researcher hacks sex toy

Rapper Dave East nudes reportedly leaked

Rapper Dave East may have fallen victim to a nude leak on June 5th after a series of explicit photos purportedly of the rapper emerged online. It is unclear whether or not the images are real, however if confirmed, the rapper would be part of a long list of celebrities whose private images were compromised…

Cisco updates include fixes for ‘high’ rated RCE, DoS flaws

Cisco released security updates to address vulnerabilities in multiple Cisco products including flaws that could allow a remote attacker could exploit to take control of an affected system. The updates included fixes for a remote code execution (RCE) flaw, a series denial of service (DoS) vulnerability, information disclosure vulnerability and several cross-site scripting (XSS) vulnerabilities,…

DHS investigates possible vulnerabilities in medical devices, Reuters reports

Medical data breaches gain lawmakers’ attention

A series of data breaches involving the medical information of more than 20 million has attracted the attention of Congress prompting Sens. Bob Menendez, D-N.J., Cory Booker, D-N.J., and Mark Warner, D-Va., to write the organization for more details. “We are deeply concerned that this breach compromised personal, financial, and medical information of nearly 12…

Researchers exploit crypto wallet bug before hackers to save customer funds

A cryptocurrency startup exploited a backdoor in its own platform to protect its customer’s funds after threat actors had spotted and attempted to exploit the flaw. Researchers on the npm, Inc security team discovered a backdoor in the Agama cryptocurrency wallet on the Komodo platform during a security audit of the platform. “This attack focused…

Firefox announces Enhanced Tracking protection

Mozilla’s Firefox announced it will not enable Enhanced Tracking Protection (ETP) by default while at the same time updating Facebook Container, Firefox Monitor and Lockwise. The updated features mean Firefox will now block known third-party trackers by default making it more difficult for thousands of companies to track moves, according to a June 4 blog…

Organizations still struggle to manage vulnerability patches, report

Nearly 27 percent of organizations worldwide have been breached as a result of an unpatched vulnerability, according to Tripwire’s 2019 Vulnerability Management Survey.. In Europe, companies fair worse with 34 percent of respondents reporting a breach due to the same cause. Tripwire partnered with Dimensional Research to survey 340 infosecurity professionals on vulnerability management trends…

applePatch

MacOS 0-Day Flaw exploits ‘Synthetic Clicks’

A security researcher with a history of finding bugs in Apple products discovered a zero-day vulnerability that can bypass Apple’s security protections with “synthetic clicks.” Security researcher Patrick Wardle demonstrated the bug, at the Object by the Sea security conference in Monaco, which affects macOS Mojave and takes advantage of ‘synthetic events’, a macOS automation…

Threat actors host malware, C2 servers on Microsoft Azure

Cybercriminals are storing malicious content, including malware and C2 servers, on Microsoft’s Azure cloud services. In one incident nearly 200 websites showing tech support scams were hosted on the platform, according to a Bleeping Computer blog post. In another incident, threat actors used Azure to host a phishing template for Office 365, which could have…

Next post in Malware