Tag: www.infosecurity-magazine.com

Dating App Breach Exposes Images of 13,000 Women

Dating app Tea has been compromised by a hacker, resulting in the exposure of 13,000 selfies This article has been indexed from www.infosecurity-magazine.com Read the original article: Dating App Breach Exposes Images of 13,000 Women

Prolonged Chinese Cyber Espionage Campaign Targets VMware Appliances

Sygnia observed Chinese cyber campaign dubbed Fire Ant deploying sophisticated techniques to gain full compromise of victim environments, discovering isolated assets This article has been indexed from www.infosecurity-magazine.com Read the original article: Prolonged Chinese Cyber Espionage Campaign Targets VMware Appliances

New Chaos Ransomware Emerges, Launches Wave of Attacks

Cisco Talos warned that the Chaos group, thought to be formed of former BlackSuit members, has launched a wave of attacks targeted a variety of sectors This article has been indexed from www.infosecurity-magazine.com Read the original article: New Chaos Ransomware…

Malware Campaign Masquerades as Dating Apps to Steal Data

A large-scale malware campaign known as SarangTrap has been observed using fake dating apps to steal personal data, targeting South Korean users This article has been indexed from www.infosecurity-magazine.com Read the original article: Malware Campaign Masquerades as Dating Apps to…

Ransomware Deployed in Compromised SharePoint Servers

Microsoft said Chinese actor Storm-2603 is deploying Warlock ransomware following the exploitation of vulnerabilities in on-prem SharePoint systems This article has been indexed from www.infosecurity-magazine.com Read the original article: Ransomware Deployed in Compromised SharePoint Servers

Active Campaign Exploits Cloud Flaws for Cryptomining

Wiz believes the active campaign is part of a broader crypto-scam infrastructure, which uses a wide range of exploitation techniques This article has been indexed from www.infosecurity-magazine.com Read the original article: Active Campaign Exploits Cloud Flaws for Cryptomining