Security
-
Cybercriminals are using stolen browser fingerprints to bypass security checks and impersonate users. The ScreamedJungle attack targets outdated Magento e-commerce platforms to inject malicious scripts that steal unique digital identifiers. This allows hackers to evade security systems, including multi-factor authentication (MFA) and device reputation checks.
-
Cybercriminals are abusing PayPal’s address settings to send scam emails that look like official notifications. These emails claim a new shipping address has been added to your PayPal account and include a fake purchase confirmation for a MacBook M4. The goal is to trick users into calling a fake PayPal support number, where scammers try to gain remote access to their devices.
-
A dangerous Wi-Fi password-stealing tool has been found on GitHub. This Python-based script can extract saved Wi-Fi credentials from Windows devices, making it a serious security risk. While labeled as an "educational tool," it can easily be misused by hackers to gain unauthorized network access.
-
Raymond Limited, a well-known textile and clothing company, has confirmed a cyber attack on its IT systems. The breach impacted some internal infrastructure, but the company's retail stores, supply chain, and digital services continue to operate normally. The attack was detected during routine security monitoring, and immediate action was taken to isolate affected systems.
-
Cybercriminals have exploited over 150 Indian government and financial websites to trick users into fake gambling and investment scams. By injecting malicious code into trusted domains, they manipulate search engine rankings, redirecting visitors to fraudulent rummy and casino websites. This attack highlights the urgent need for stronger cybersecurity measures to protect public sector platforms.
-
A major security flaw in the Indian Post Office portal exposed thousands of KYC records, including Aadhaar numbers, PAN details, and personal data. The vulnerability, known as an IDOR attack, allowed unauthorized users to access sensitive data simply by altering numbers in the website’s URL. This incident highlights the urgent need for stronger cybersecurity in government platforms.
-
A new phishing attack has been discovered where hackers use Webflow’s CDN and fake CAPTCHAs to trick users into entering their credit card details. The attackers manipulate search results to lure victims into clicking malicious PDFs that lead to phishing websites.
-
A serious security flaw in YouTube and Google’s Pixel Recorder API allowed hackers to extract users’ email addresses from their anonymous YouTube accounts. Security researchers found a way to convert hidden Google IDs (Gaia IDs) into email addresses, exposing millions of users to privacy risks. Google has now fixed the issue, but it highlights how interconnected services can create security loopholes.
-
North Korean hacking group Kimsuky is using a custom RDP Wrapper and proxy tools to gain persistent, stealthy access to infected computers. This marks a shift in their tactics, moving away from noisy malware to more covert remote access techniques.
-
Cybercriminals are using fake Microsoft Active Directory Federation Services (ADFS) login pages to steal usernames, passwords, and MFA codes from employees in education, healthcare, and government organizations. The stolen credentials allow hackers to access corporate email accounts, send phishing emails, and commit financial fraud.