Nettipetoksia tehnyt vangittiin
www.poliisi.fi/tietoa_poliisista/tiedotteet/1/1/nettipetoksia_tehnyt_vangittiin_90541?language=fi Petokset ovat olleet enimmäkseen tyypillisiä nettipetoksia, joissa myydään olematonta tavaraa hyväuskoisille ihmisille lähinnä Tori.fi-sivustolla.
Hacker leaks database of dark web hosting provider
www.zdnet.com/article/hacker-leaks-database-of-dark-web-hosting-provider/ “This information could substantially help law enforcement track the individuals running or taking part in illegal activities on these darknet sites, ” Under the Breach told ZDNet.
The zero-day exploits of Operation WizardOpium
securelist.com/the-zero-day-exploits-of-operation-wizardopium/97086/ While we’ve already published blog posts briefly describing this operation (available here and here), in this blog post we’d like to take a deep technical dive into the exploits and vulnerabilities used in this attack.
Cyber-Criminal espionage Operation insists on Italian Manufacturing
yoroi.company/research/cyber-criminal-espionage-operation-insists-on-italian-manufacturing/ During our Cyber Threat Intelligence monitoring we spotted new malicious activities targeting some Italian companies operating worldwide in the manufacturing sector, some of them also part of the automotive production chain. See also:
Bringing VandaTheGod down to Earth: Exposing the person behind a 7-year hacktivism campaign
research.checkpoint.com/2020/vandathegod/ Since 2013, many official websites belonging to governments worldwide were hacked and defaced by an attacker who self-identified as ‘VandaTheGod.’ Although the websites’ defacement gave VandaTheGod a lot of attention, the attacker’s activity extended beyond that, to stealing credit card details and leaking sensitive personal credentials. However, by closely examining those attacks, we were able to map VandaTheGod’s activity over the years, and eventually uncover the attacker’s real identity.