Australia commences work on electronic surveillance law reforms

The Australian government has commenced work to reform the country’s electronic surveillance laws that have been labelled as overly complex, inconsistent, and incompatible with the current technology landscape. The federal…

BitMart Exchange hacked as hackers steal $150 million

BitMart Exchange has confirmed that the security breach involves one of its ETH hot wallets and one of BSC hot wallets. BitMart Exchange, a cryptocurrency trading platform has suffered a…

Hackers steal $120m from Badger Defi and $30m from MonoX

MonoX security breach was caused by a bug in smart contracts meanwhile Badger is still investigating the incident. Two DeFi projects BadgerDAO and MonoX are the latest victims of security…

The Justice Department is ramping up its crackdown on money mules

Written by Tonya Riley Dec 3, 2021 | CYBERSCOOP U.S. law enforcement recovered nearly $3.7 million in fraud proceeds and charged more than 30 individuals for their alleged involvement in…

Compromise assessment or threat hunting? What do organizations need?

Organizations worldwide are undergoing rapid digitization to keep up with the fast-paced world we live in today. While it is a good initiative, cloud computing and remote work setup have…

What Is Privilege Escalation? Definition, Types and Examples

Privilege escalation might be a confusing cybersecurity term for many. That’s why in this article we’re going to shed a little bit more light on this topic. Keep reading to…

Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify

Trend Micro – Trend Micro – Vulnerabilities Exploited for Monero Mining Malware Delivered via GitHub, Netlify We looked into exploitation attempts we observed in the wild and the abuse of…

AT&T Takes Steps to Mitigate Botnet Found Inside Its Network 

AT&T is battling a modular malware called EwDoor on 5,700 VoIP servers, but it could have a larger wildcard certificate problem. AT&T is taking action to take down a botnet…

Facebook's Meta says bad actors are changing tactics as it takes down six more groups

Meta has detailed takedowns of what it described as six ‘adversarial networks’ from across the world that were using Facebook for behaviour including spreading false information, harassment and trying to…

What Is Virtual Network Computing (VNC)

VNC, which stands for Virtual Network Computing, is one of several kinds of desktop remote sharing systems available for professionals but also for less tech-savvy home users as well. This…