Sly Uduosa

Sylvester Uduosa who goes by the nickname 'Sly' is a Legal Practitioner, Certified Ethical Hacker and Python Programmer.

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security

The criminal underworld is promoting a new phishing-as-a-service (PhaaS) toolkit called EvilProxy as a way for threat actors to get beyond the two-factor authentication (2FA) safeguards put in place against internet services. In a report published on Monday, Resecurity researchers stated that “EvilProxy actors are exploiting reverse proxy and cookie injection methods to overcome 2FA […]

New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security Read More »

Shopify Caught Using Weak Password Policy Involved in Password Breaches

According to a recent revelation, the Shopify customer-facing section of its website has extremely lax password requirements. The article claims that Shopify requires its users to create passwords that are at least five characters long and do not contain a space at the start or end. One billion passwords that were known to have been

Shopify Caught Using Weak Password Policy Involved in Password Breaches Read More »

Samsung Acknowledges Data Breach that Leaked Information About Some US Customers

This is the second time this year that South Korean chaebol Samsung has disclosed a cybersecurity incident that led to the unlawful access of certain customer information. Samsung stated in a notice that “in late July 2022, an unauthorized third-party obtained information from several of Samsung’s U.S. networks.” We discovered through our continuing investigation that

Samsung Acknowledges Data Breach that Leaked Information About Some US Customers Read More »

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks

To protect the ecosystem against supply chain threats, Google on Monday unveiled a new bug bounty program for its open source projects that offers rewards ranging from $100 to $31,337 (a reference to eleet or leet). One of the first open source-specific vulnerability programs is known as the Open Source Software Vulnerability Rewards Program (OSS

Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks Read More »

Hackers Distributing Malware Using Fake DDoS Protection Pages

Hackers are using WordPress websites to show fake Cloudflare DDoS protection pages that spread malware like NetSupport RAT and Raccoon Stealer. According to a report last week by Sucuri’s Ben Martin, a recent spike in JavaScript injections that target WordPress sites has led to phony DDoS prevent prompts that direct victims to download remote access

Hackers Distributing Malware Using Fake DDoS Protection Pages Read More »

Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations

The threat actor responsible for the attack on Twilio and Cloudflare earlier this month has been connected to a larger phishing operation that targeted 136 businesses and led to a total of 9,931 accounts being compromised. Because the primary intent of the assaults was to “get Okta identity credentials and two-factor authentication (2FA) codes from

Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations Read More »

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability

Manufacturer of Bitcoin ATMs General Bytes acknowledged that it was a victim of a hack that took advantage of a previously undetected software fault to steal cryptocurrency from its consumers. The company stated in an advisory last week that “the attacker was able to remotely establish an admin user via CAS administrative interface via a

Hackers Stole Crypto from Bitcoin ATMs by Exploiting Zero-Day Vulnerability Read More »

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts

Numerous trojans targeted at WhatsApp and WhatsApp Business are hidden on low-cost Android device models that are knockoffs of prominent smartphone brand names. The trojans, which Doctor Web first identified in July 2022, were found in at least four separate cellphones’ system partitions: the P48pro, Radmi Note 8, Note30u, and Mate40. The cybersecurity company stated

Researchers Discover Fake Phones with Backdoors to Hack WhatsApp Accounts Read More »

Twitter Manager Sentenced For Spying On Users For Saudi Arabia

A former Twitter employee has been found guilty for his part in gathering confidential data on specific Twitter users and giving it to Saudi Arabia. After a two-week trial in federal court in San Francisco, Ahmad Abouammo, 44, was found guilty by a jury, according to a report from Bloomberg on Tuesday. Upon conviction, he

Twitter Manager Sentenced For Spying On Users For Saudi Arabia Read More »