Sly Uduosa

Sylvester Uduosa who goes by the nickname 'Sly' is a Legal Practitioner, Certified Ethical Hacker and Python Programmer.

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers

The U.S. Department of Justice (DoJ) has announced the capture of $500,000 worth of Bitcoin from North Korean hackers who used a new ransomware strain known as Maui to extort digital payments from multiple companies. In a press release published on Tuesday, the DoJ stated that “the recovered money include ransoms paid by healthcare providers […]

FBI Seizes Cryptocurrency and $500,000 in Ransomware Payments from North Korean Hackers Read More »

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps

Numerous bogus programmes that were discovered spreading the Joker, Facestealer, and Coper malware families through the online store have been removed by Google  (SEE: HOW HACKERS HACK ANDROID PHONES). Although the Android shop is regarded as a reliable resource for finding and installing apps, malicious actors have frequently found ways to get around Google’s security

Joker, Facestealer, and Coper Malware Distribution Found in Several New Play Store Apps Read More »

Ukrainian Authorities Arrested Phishing Gang That Stole $3.37 Million USD

In a campaign to take advantage of the ongoing crisis, hundreds of phishing sites purported to offer financial aid to Ukrainian civilians. Nine members of a criminal gang were detained by the Cyber Police of Ukraine after they stole 100 million hryvnias from them. According to a press release from the organization last week, “criminals

Ukrainian Authorities Arrested Phishing Gang That Stole $3.37 Million USD Read More »

Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild

Google released security upgrades on Monday to fix a high-severity zero-day bug in its Chrome web browser that the company claimed is already being used in the wild. The issue, designated CVE-2022-2294, pertains to a heap overflow vulnerability in the WebRTC component, which enables real-time audio and video communication in browsers without the need to

Update Google Chrome Browser to Patch New Zero-Day Exploit Detected in the Wild Read More »

A New Trending Hacking Technique Called “Account Pre-Hijacking”

According to new research, malicious actors can get illegal access to users’ online accounts via a new approach known as “account pre-hijacking.” The assault targets the account creation process, which is common on websites and other online platforms, allowing an adversary to carry out a series of operations before an unwary victim establishes an account

A New Trending Hacking Technique Called “Account Pre-Hijacking” Read More »

U.S. Warns Against North Korean Hackers Posing as IT Freelancers

Highly skilled software and mobile app developers from the Democratic People’s Republic of Korea (DPRK) are posing as “non-DPRK nationals” in hopes of landing freelance employment in an attempt to enable the regime’s malicious cyber intrusions. That’s according to a joint advisory from the U.S. Department of State, the Department of the Treasury, and the

U.S. Warns Against North Korean Hackers Posing as IT Freelancers Read More »

Researchers Find Potential Way to Run Malware on iPhone Even When it’s OFF

A first-of-its-kind security analysis of iOS Find My function has identified a novel attack surface that makes it possible to tamper with the firmware and load malware onto a Bluetooth chip that’s executed while an iPhone is “off.” The mechanism takes advantage of the fact that wireless chips related to Bluetooth, Near-field communication (NFC), and

Researchers Find Potential Way to Run Malware on iPhone Even When it’s OFF Read More »

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit

A new research published by academics from KU Leuven, Radboud University, and the University of Lausanne has revealed that users’ email addresses are exfiltrated to tracking, marketing, and analytics domains before such is submitted and without prior consent. The study involved crawling 2.8 million pages from the top 100 websites, and found that as many

Web Trackers Caught Intercepting Online Forms Even Before Users Hit Submit Read More »

Keep an Eye Out! Dockers, AWS, and Alibaba Cloud Are Being Targeted by Cryptocurrency Miners.

As part of an ongoing malware effort, LemonDuck, a cross-platform cryptocurrency mining botnet, is targeting Docker to mine cryptocurrency on Linux servers. In a new study, CrowdStrike stated, “It operates an anonymous mining operation by using proxy pools, which disguise the wallet addresses.” “It avoids detection by targeting and disabling Alibaba Cloud’s monitoring service.” LemonDuck

Keep an Eye Out! Dockers, AWS, and Alibaba Cloud Are Being Targeted by Cryptocurrency Miners. Read More »