LinkedIn Account Takeover Campaign

There is currently an active campaign by hackers to take over LinkedIn accounts. This has resulted in victims being pressured into paying to regain control of their account or facing permanent deletion. Security research company, Cyberint has observed an ongoing and...

Cybercrime Forums Selling Personal Information of Hackers

Info stealing malware do not discriminate when it is stealing personal information. Security researchers, discovered that some of the information stolen are also from hackers. Security researchers analysing stolen data from 100 of the leading cybercrime forums found...
How Leaky is your VPN?

How Leaky is your VPN?

A two decades old vulnerability has been discovered which results in exposing encrypted VPN traffic. And every VPN product is vulnerable on at least one device. The academic researchers have called the attack TunnelCrack and have published proof of concept exploit...

Popular Open Source Software Breaks Users’ Trust

Popular Open Source software Moq has broken user trust by quietly making changes that collects user email addresses. The popular software is distributed on the NuGet software registry and has been downloaded over 476 million times. The change was made in early August...
Open Source Maintainers Report

Open Source Maintainers Report

The Linux Foundation released a report on Open Source Maintainers. They interviewed some of the community’s most influential maintainers to understand more about how maintainers become maintainers, and to capture their experiences, observations and success...

Company using Keystroke Logging to Measure Employee Productivity

How do you measure productivity of remote workers? For one company, productivity is measure by having more than 500 keystrokes on the computers every hour. In a rare case for Australia, an employee had been terminated for not meeting the required productivity levels....

Techniques for Getting Malware onto Android Devices

How are malicious apps getting pass Google Play Store’s review process and their rigorous PHA (Potentially Harmful Application) screening? Well, they’re using a technique called versioning which is sneaky and hard to detect. The attackers would first...

Highly Accurate Acoustic Keylogger Attack

Academic researchers from British universities have developed a deep learning side channel attack that can be used to steal data from keyboard strokes that are recorded using a microphone with an accuracy of 95%. The audio can be recorded from a nearby microphone, or...

Frequently Exploited Vulnerabilities in 2022

A number of cybersecurity agencies have co-authored a joint Cybersecurity Advisory (CSA) on frequently exploited vulnerabilities in 2022. The advisory provided details on CVEs routinely and frequently exploited by cyber criminals. The agencies included: United States:...