Showing only posts by Jessica Lyons. Show all posts.

Russian fake-news network, led by an ex-Florida sheriff's deputy, storms back into action with 200+ new sites

Source

As the Trump administration guts efforts to counter election disinfo The Russian troll farm that in the lead-up to the 2024 US presidential election posted a bizarro video claiming Democratic candidate Kamala Harris was a rhino poacher, is back with hundreds of new fake news websites serving up phony …

Microsoft blocks bait for ‘fastest-growing’ 365 phish kit, seizes 338 domains

Source

Redmond names alleged ringleader, claims 5K+ creds stolen and $100k pocketed Microsoft has seized 338 websites associated with RaccoonO365 and identified the leader of the phishing service - Joshua Ogundipe - as part of a larger effort to disrupt what Redmond's Digital Crimes Unit calls the "fastest-growing tool used by cybercriminals …

Hijacker helper VoidProxy boosts Google, Microsoft accounts on demand

Source

Okta uncovers new phishing-as-a-service operation with 'multiple entities' falling victim Multiple attackers using a new phishing service dubbed VoidProxy to target organizations' Microsoft and Google accounts have successfully stolen users' credentials, multi-factor authentication codes, and session tokens in real time, according to security researchers.... [...]

Defense Dept didn't protect social media accounts, left stream keys out in public

Source

'The practice... has since been fixed,' Pentagon official tells The Reg The US Department of Defense, up until this week, routinely left its social media accounts wide open to hijackers via stream keys - unique, confidential identifiers generated by streaming platforms for broadcasting content. If exposed, these keys can allow …

No gains, just pains as 1.6M fitness phone call recordings exposed online

Source

HelloGym's data security clearly skipped leg day Exclusive Sensitive info from hundreds of thousands of gym customers and staff – including names, financial details, and potentially biometric data in the form of audio recordings – was left sitting in an unencrypted, non-password protected database, according to a security researcher who shut …

« newer articles | page 6 | older articles »