Sly Uduosa

Sylvester Uduosa who goes by the nickname 'Sly' is a Legal Practitioner, Certified Ethical Hacker and Python Programmer.

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

Manufacturer of Bitcoin ATMs General Bytes acknowledged that it was a victim of a hack that took advantage of a previously undetected software fault to steal cryptocurrency from its consumers. The company stated in an advisory last week that “the attacker was able to remotely establish an admin user via CAS administrative interface via a […]

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability Read More »

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts

Numerous trojans targeted at WhatsApp and WhatsApp Business are hidden on low-cost Android device models that are knockoffs of prominent smartphone brand names. The trojans, which Doctor Web first identified in July 2022, were found in at least four separate cellphones’ system partitions: the P48pro, Radmi Note 8, Note30u, and Mate40. The cybersecurity company stated

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts Read More »

Twitter Manager Sentenced For Spying On Users For Saudi Arabia

A former Twitter employee has been found guilty for his part in gathering confidential data on specific Twitter users and giving it to Saudi Arabia. After a two-week trial in federal court in San Francisco, Ahmad Abouammo, 44, was found guilty by a jury, according to a report from Bloomberg on Tuesday. Upon conviction, he

Twitter Manager Sentenced For Spying On Users For Saudi Arabia Read More »

Australian Hacker Arrested for Selling Spyware to Cyber Criminals

A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic violence perpetrators and child sex offenders. Jacob Wayne John Keen, who currently resides at Frankston, Melbourne, is said to have created the remote access trojan (RAT) when he was 15, while also administering

Australian Hacker Arrested for Selling Spyware to Cyber Criminals Read More »

Dark Utilities Lets Hackers Create C2 Centers In Few Seconds

Cybercriminals can now establish a command and control (C2) hub for their malicious actions using a new service called Dark Utilities. In 2022, Dark Utilities was developed as a platform for C2-as-a-Service. The platform offers a wide range of features, such as cryptomining, DDoS protection, and remote access options. Currently, there are about 3,000 users

Dark Utilities Lets Hackers Create C2 Centers In Few Seconds Read More »

Hackers Distribute PLC and HMI Password Cracking Tool to Attack Industrial Systems

A new campaign that uses password cracking software to grab control of Programmable Logic Controllers (PLCs) and coax the devices into becoming part of a botnet is aimed at industrial engineers and operators. According to Dragos security researcher Sam Hanson, the malware “exploited a flaw in the firmware which allowed it to extract the password

Hackers Distribute PLC and HMI Password Cracking Tool to Attack Industrial Systems Read More »

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers

The U.S. Department of Justice (DoJ) has announced the capture of $500,000 worth of Bitcoin from North Korean hackers who used a new ransomware strain known as Maui to extort digital payments from multiple companies. In a press release published on Tuesday, the DoJ stated that “the recovered money include ransoms paid by healthcare providers

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers Read More »

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps

Numerous bogus programmes that were discovered spreading the Joker, Facestealer, and Coper malware families through the online store have been removed by Google  (SEE: HOW HACKERS HACK ANDROID PHONES). Although the Android shop is regarded as a reliable resource for finding and installing apps, malicious actors have frequently found ways to get around Google’s security

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps Read More »