What the hack?! On June 21, a Twitter user who goes by the name of ohnePixel reported that $2,000,000+ worth of CS:GO skins have been stolen from a hacked account. The stolen items include such rarities as seven Souvenir AWP Dragon Lores, a no-star Karambit, Blue Gems and more. Its worth mentioning that a Souvenir AWP show more ...
Dragon Lore is the most expensive skin that CS:GO players can own, easily costing tens or even hundreds of thousands of dollars! $2,000,000+ in CS:GO skins have been hacked and stolen (some items getting moved/sold as we speak) this is the most expensive inventory all-time, containing the most legendary items in CS:GO history (7x souvenir dragon lores, no-star karambit, #1 blue gems)@CSGO @Steam pic.twitter.com/d80miZorNh — ohnePixel (@ohnePixel) June 21, 2022 The alleged inventory has been private for the last three years. After the hack, the players started noticing the items in the inventory going public, and thats when they knew something was up! According to the above-mentioned ohnePixel, the e-mail and password of the inventory owners Steam account were changed a week ago, but the hack went unnoticed. Some streams even caught the process live on Twitch! Estimates of how much the stolen inventory could be worth vary from two to over four million dollars. Skins and cosmetics in CS:GO are one of the most expensive items in the world of gaming due to the games huge popularity and long legacy. That said, the hacker either didnt know the actual worth of the stolen items he was selling, or, more likely, preferred to make some quick cash and therefore was selling cheap. Whatever the case, most of the items were sold for a fraction of the market price. Some of the stolen items seems to have been sold recently for a fraction of the normal asking price How to protect your CS:GO treasures Weve been noticing of late a rise in attacks and hacks on almost every popular online game, and its due to a rise in player numbers and investments in virtual items. This is why its crucial to follow a proper guide on protecting your Steam account against scammers and trolls. Weve seen a lot of gamers falling victim to scams and hacks due to a lack of security measures. Some players would rather not have active AV software while playing an online game — in fear of reducing the performance of their machines. However, industry-leading antivirus solutions have a special gaming mode, which ensures your performance isnt affected, notifications are muted, and at the same time your PC stays protected. So dont forget to install a trusted security solution — and dont disable it while playing.
Episode 256 of the Transatlantic Cable kicks off with discussions around NFTs, cryptocurrency and Bill Gates. From there, the team talk about news coming out of the United Kingdom around cookies. It seems that the UK government is keen to make some changes to current cookie legislation, but will this be a win for show more ...
businesses or consumers? Following that, theres discussion around BidenCash – an underground site making waves by trying to give away stolen credit card information. In addition to this, Dave recently sat down with Boris Larin from Kaspersky GReAT to talk about his recent work modding Metal Gear Solid 2, allowing a true 3rd person perspective camera – something that wasnt possible in the original game. If you liked what you heard, please consider subscribing! Bill Gates says crypto and NFTs are 100% based on greater fool theory Can crumbling cookies sweeten UK data-protection plans? New BidenCash site sells your stolen credit card for just 15 cents
The fund is also providing DHS' Security Information Network (HSIN) service with a $26.9 million investment as the agency seeks to overhaul its information-sharing platform for the private sector and government partners.
Researchers found a malicious PowerShell script targeting browser extensions related to cryptocurrency apps like Coinbase, Binance, Exodus, Atomic, Electrum, Ledger, Jaxx, Guarda, Armory, Trezor, and others.
In one recent investigation, researchers found several malicious domains by validating the skimmer activity. The threat actor used three unique themes, named after JS libraries to hide the skimmer.
The NSA and cybersecurity partner agencies issued an advisory today recommending system administrators to use PowerShell to prevent and detect malicious activity on Windows machines.
To add to the bad news, 27% of executives’ personal devices contain malware, 76% of their personal devices are actively leaking data, and 87% of executives’ personal devices have no security installed, according to BlackCloak.
The novel loader, dubbed Nimbda, is "bundled with a Chinese language greyware 'SMS Bomber' tool that is most likely illegally distributed in the Chinese-speaking web," Israeli cybersecurity company Check Point said in a report.
The use of artificial intelligence in security should be very focused on multiplying the efforts of security teams, especially considering the current shortage of security skills.
Laura Galante is a longtime cybersecurity intelligence analyst who came to Mandiant in 2012 and served as its director of global intelligence, after three years spent leading the Defense Intelligence Agency’s Russia Cyber Analysis Team.
One of the two new hacking campaigns uses a phony tax collection document purportedly sent by the national tax agency, while the other uses a malicious document that discussed the threat of nuclear attack from Russia.
Chain-Bench can be used by organizations to scan the DevOps stack from source code to deployment and simplify compliance with security regulations, standards, and internal policies, Aqua Security explained.
Threat actors are using email spam and malicious URLs to deliver LNK files to victims. These files instruct legitimate applications like PowerShell, CMD, and MSHTA to download malicious files.
The full impact of the cyberattack is being investigated, including whether data has been compromised. The incident forced the company to shut down some production control systems and switch to manual processes.
This week, the beleaguered Israeli surveillance ware vendor NSO Group admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region.
The FTC said last month that between May 2013 and September 2019, Twitter “induced people to provide their phone numbers and email addresses by claiming that the company’s purpose was, for example, to ‘Safeguard your account.’”
Today, the group has announced multiple targets for coordinated DDoS attacks – the resources to be attacked are distributed between so-called “units” who are based on members and volunteers who joined previous and current campaigns.
The study, conducted by the Marsh McLennan Cyber Risk Analytics Center and based on an analysis of nearly 117,000 incidents, found that larger organizations were statistically more likely to have a greater preponderance of API-related incidents.
During the campaign, Conti affiliates managed to compromise more than 40 organizations in various sectors of activity operating across wide geography but with a focus on companies based in the U.S.
Organizations face three emerging threats that compromise identities, exploit the use of accomplices or insiders and evade current detection and defenses, according to security researcher Oliver Rochford.
Affected vendors include Baker Hughes (Bentley Nevada), Emerson, Honeywell, JTEKT, Motorola, Omron, Phoenix Contact, Siemens, and Yokogawa. One of the impacted vendors has not been named as the disclosure process is still ongoing.
According to Secureworks' Counter Threat Unit (CTU) research team, two activity clusters related to HUI Loader have been connected to Chinese-speaking threat actors, namely Bronze Riverside and Bronze Starlight.
On June 10, the company started to inform potentially impacted individuals of a data breach that occurred on March 25, and which might have resulted in their personal information being accessed by a third-party.
While the real MetaMask doesn’t require its users to verify or provide KYC details, dealing with verification requests can be a frustrating experience, possibly causing recipients to be less cautious.
Malware delivered to email accounts rose 196% in 2021 year-on-year, according to Trend Micro, which warns that email remains a major avenue for criminals looking to deliver malware and phish account credentials.
Tracked as CVE-2022-31083 and issued a CVSS severity score of 8.6, the security issue is described as a scenario in which the authentication adapter for Apple Game Center’s security certificate is not validated.
The attackers have used Cobalt Strike, Sliver, and several commercially available network scanners. They targeted an ESXi server exposed over VMWare Horizon UAG by exploiting the Log4Shell flaw.
While there has been a slight increase in the traditional email phishing attack, the other trends include social media impersonation scams, dark web threats, hybrid vishing attacks, and BEC attacks.
The scams work in a similar manner as on other platforms. Scammers create professional-looking fake profiles and attempt to strike up conversations with users using the in-built messaging feature.
According to Bitdefender researchers, the operators behind the RIG exploit kit have swapped the Raccoon Stealer malware with Dridex trojan as part of an ongoing campaign that commenced in January 2021.
Red Hat Security Advisory 2022-5029-01 - This release of Red Hat build of Eclipse Vert.x 4.2.7 GA includes security updates. Issues addressed include denial of service and deserialization vulnerabilities.
Ubuntu Security Notice 5487-2 - USN-5487-1 fixed a vulnerabilities in Apache. Unfortunately, that update introduced a regression when proxying balancer manager connections in some configurations on Ubuntu 14.04 ESM. This update reverts those changes till further fix. It was discovered that Apache HTTP Server show more ...
mod_proxy_ajp incorrectly handled certain crafted request. A remote attacker could possibly use this issue to perform an HTTP Request Smuggling attack. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a denial of service. It was discovered that Apache HTTP Server incorrectly handled certain request. An attacker could possibly use this issue to cause a crash or expose sensitive information. Multiple other issues were also originally addressed.
Red Hat Security Advisory 2022-5115-01 - An update for python-django20 is now available for Red Hat OpenStack Platform 16.2.3 (Train). Issues addressed include a remote SQL injection vulnerability.
Red Hat Security Advisory 2022-5116-01 - An update for puppet-firewall is now available for Red Hat OpenStack Platform 16.2.3 (Train). An issue was address where unmanaged rules could leave the system in an unsafe state via duplicate a comment.
Red Hat Security Advisory 2022-5114-01 - Barbican is a ReST API designed for the secure storage, provisioning and management of secrets, including in OpenStack environments.
Ubuntu Security Notice 5491-1 - Joshua Rogers discovered that Squid incorrectly handled the Gopher protocol. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service.
QNAP, Taiwanese maker of network-attached storage (NAS) devices, on Wednesday said it's in the process of fixing a critical three-year-old PHP vulnerability that could be abused to achieve remote code execution. "A vulnerability has been reported to affect PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11 with improper nginx config," the hardware vendor said in an
A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in Nim language to strike targets as part of a newly discovered campaign. The novel loader, dubbed Nimbda, is "bundled with a Chinese language greyware 'SMS Bomber' tool that is most likely illegally distributed in the Chinese-speaking web," Israeli cybersecurity
The beleaguered Israeli surveillanceware vendor NSO Group this week admitted to the European Union lawmakers that its Pegasus tool was used by at least five countries in the region. "We're trying to do the right thing and that's more than other companies working in the industry," Chaim Gelfand, the show more ...
company's general counsel and chief compliance officer, said, according to a report from Politico.
When it comes to keeping SaaS stacks secure, IT and security teams need to be able to streamline the detection and remediation of misconfigurations in order to best protect their SaaS stack from threats. However, while companies adopt more and more apps, their increase in SaaS security tools and staff has lagged behind, as found in the 2022 SaaS Security Survey Report. The survey report,
Amazon has demonstrated an experimental feature that demonstrates how a child can choose to have a bedside story read to him by his Alexa... using his dead grandmother's voice.
The UK's National Health Service has warned the public about a spate of fake messages, sent out as SMS text messages, fraudulently telling recipients that they have been exposed to the Omicron variant of COVID-19. Read more in my article on the Tripwire State of Security blog.
Internet-connected jacuzzis find themselves in hot water, and a Google engineer claims that their AI has developed feelings. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault.