How to Protect Your Digital Footprint

Attackers can use a company's digital footprint for bad intentions.

The modern business world has been greatly advanced by the internet. Its convenience and numerous benefits have made people from all over the world reliant on the digital world. As the use of digital platforms continues to increase, businesses of all sizes should consider their digital footprint. What is Corporate Digital Footprint? Your company’s digital… Continue reading How to Protect Your Digital Footprint

What is eWallet? How to Protect Your eWallet

Benefits of using an eWallet, followed by recommended steps for protecting it

During a time of crisis, Americans turned to digital wallets called eWallets to purchase supplies without face-to-face interaction with payment terminals or cards. These wallets make purchasing supplies faster and easier than traditional methods. A common alternative to eWallets is the physical wallet, which is less convenient for many people. In addition, clever crooks and… Continue reading What is eWallet? How to Protect Your eWallet

BlackCat ransomware gang publishes leaked data on the clear web site

BlackCat/ALPHV group recently announced on its victim shaming and extortion website that it had hacked into a luxury spa and resort in the Western United States. At one moment in the last 24 hours, ALPHV posted a website with the same victim name on the domain and their logo on the front page. The ALPHV… Continue reading BlackCat ransomware gang publishes leaked data on the clear web site

RaidForums shutdown as the result of Operation Tourniquet

Diogo Santos Coelho, the organisator of RaidForums, was captured

The chain of international law enforcement agencies – Europol, FBI, NCA and others – seized the world’s largest hacker forum – RaidForums. That seems to be part of an anti-cybercrime campaign that started from the Hydra Shop shutdown. On April 12, 2022, the National Crime Agency (shorty NCA) reported on their official website about the… Continue reading RaidForums shutdown as the result of Operation Tourniquet

Vulnerability in macOS Leads to Data Leakage

Microsoft said that attackers could use a macOS vulnerability to bypass Transparency, Consent, and Control (TCC) technology and gain access to protected user data. Back in the summer of 2021, a research group informed Apple developers about a vulnerability dubbed powerdir (CVE-2021-30970). The bug is related to the TCC technology, which is designed to block… Continue reading Vulnerability in macOS Leads to Data Leakage

Epik hoster hack affected 15 million users, not just the company’s clients

Last week, Anonymous hacktivists reported about hack of the database of the domain registrar and hoster Epik, which was previously often criticized for hosting “right-wing” sites including 8chan, Gab, Parler and The Donald. The stolen data (over 180 GB) was published in torrent format and, according to hackers, contains information for the last decade. Since… Continue reading Epik hoster hack affected 15 million users, not just the company’s clients

Anonymous hacktivists attacked the Epik hoster with the right-wing radical sites

Anonymous hacktivists attacked into the database of the domain registrar and hoster Epik, which was previously often criticized for hosting right-wing sites including 8chan, Gab, Parler and The Donald. The data stolen from the hoster (more than 180 GB) was published in torrent format and, according to hackers, it contains information from the last decade.… Continue reading Anonymous hacktivists attacked the Epik hoster with the right-wing radical sites

List of suspects in terrorism that are monitored by the FBI leaked to the network

A copy of the FBI’s Terrorist Screening Center (TSC) list has Leaked to the network. It is a list of suspects in terrorism that are monitored by FBI. The database contains 1.9 million records, including the secret “No Fly List”, that is, a list of persons who should not be allowed on board of the… Continue reading List of suspects in terrorism that are monitored by the FBI leaked to the network

Ukraine’s largest IT company SoftServe has been attacked by a ransomware

One of the largest IT companies in Ukraine, SoftServe (number 2 in the latest DOU.UA rating), was attacked by a ransomware. A number of the company’s services stopped working, according to the AIN.UA publication. The cybercriminals launched a ransomware virus into the system. As a result, a number of SoftServe services stopped working, and the… Continue reading Ukraine’s largest IT company SoftServe has been attacked by a ransomware

Analysts say that over 5 billion unique credentials can be found on the black market

Analysts at Digital Shadows have estimated that there are currently more than 15 billion stolen logins and passwords, including more than 5 billion unique credentials, on the black market (hacker forums, underground marketplaces, paste sites, file sharing, and so on). For more than a year, the company has been collecting data from the abovementioned sources,… Continue reading Analysts say that over 5 billion unique credentials can be found on the black market