PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Cyber Bites

NEW TOOLS

Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email cybersec@cybeseclabs.com then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Cyber BitesCyber Threats

60 percent of all publicly reported hacks attributed to two hacker groups.

Two hacker groups are behind 60% of all publicly reported cryptocurrency exchange hacks and are believed to have stolen around $1 billion worth of cryptocurrency, according to a report published last week by blockchain analysis firm Chainalysis. “On average, the hacks we traced from the two prominent hacking groups stole $90 million per hack,” said Chainalysis. Source: ZDNet The post 60 percent of all publicly reported hacks attributed to two hacker groups. appeared first on IT Security Guru.

Cyber BitesCyber Threats

European businesses hit with 60,000 data breaches in eight months.

More than 59,000 data breaches have been reported across Europe since data protection laws were brought in last year, new figures have revealed. The Netherlands, Germany and the UK topped the list of the most reported breaches in the eight months since new GDPR laws came into force, according to law firm DLA Piper. The breaches, which range from minor errors such as missent emails to major cyber hacks, were reported by public and private organisations in the 26 European countries where data is…

Cyber BitesCyber Threats

GoDaddy Hole still being exploited by hackers.

Godaddy.com, the world’s largest domain name registrar, recently addressed an authentication weakness that cybercriminals were using to blast out spam through legitimate, dormant domains. But several more recent malware spam campaigns suggest GoDaddy’s fix hasn’t gone far enough, and that scammers likely still have a sizable arsenal of hijacked GoDaddy domains at their disposal. Source: Krebs on Security The post GoDaddy Hole still being exploited by hackers. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Hacker behind ‘Collection #1’ Data Dump revealed.

Researchers say they have identified the threat actor behind the massive “Collection #1” data dump which exposed hundreds of millions of credentials on a hacking forum in January. Recorded Future researchers said this weekend that an individual using the moniker “C0rpz” has claimed as early as Jan. 7 to be the original creator and seller of the Collection #1 data. The original database of breached emails – totalling 773 million unique email addresses –was discovered a popular underground hacking forum on Jan. 17. Source:…

Cyber BitesCyber Threats

Data breach announced by Huddle House.

US-based casual dining and fast food restaurant chain Huddle House announced late Friday last week a security breach that impacted its point of sale (POS) system. “Criminals compromised a third-party point of sale (POS) vendor’s data system and utilized the vendor’s assistance tools to gain remote access-and the ability to deploy malware-to some Huddle House corporate and franchisee POS systems,” Huddle House said in a security alert listed on its front page. Source: ZDNet The post Data breach announced by Huddle House. appeared first…

Cyber BitesCyber Threats

20-year-old hacker sentenced to 10 years prison time.

A 20-year-old college student who stole cryptocurrency worth more than $5 million by hijacking victims’ phone numbers has pleaded guilty and accepted a sentence of 10 years in prison. Ortiz was arrested last year on charges of siphoning millions of dollars in cryptocurrency from around 40 victims using a method commonly known as “SIM swapping,” which typically involves fraudulently porting of the same number to a new SIM card belonging to the attacker. Source: The Hacker News The post 20-year-old hacker sentenced to 10…

Cyber BitesCyber Threats

Jacob Rees-Mogg is being backed by the Kremlin.

Social Media research shows British MP Jacob Ree-Mogg’s #Moggmentum campaign is being pushed by accounts linked to a powerful Kremlin disinformation operation. Analysis of social media traffic between January and February 2018 reveals a pattern of disinformation being fronted by social media users connected to Russia’s Brexit interference campaign – known to have been more influential that Vote Leave and Leave.EU combined. Source: Byline Times The post Jacob Rees-Mogg is being backed by the Kremlin. appeared first on IT Security Guru.

Cyber BitesCyber Threats

New CookieMiner malware can steal all kinds of financial credentials.

CookieMiner is a new malware strain capable of stealing and exfiltrating web browser cookies related to online wallet services and cryptocurrency exchange websites, as well as passwords, text messages, and credit card credentials. The newly identified malware targets Mac devices and shares at least some of its code with the OSX.DarthMiner and OSX.LamePyre strains discovered by Malwarebytes during December 2018. Source: Bleeping Computer The post New CookieMiner malware can steal all kinds of financial credentials. appeared first on IT Security Guru.

Cyber BitesCyber Threats

Mac Users targeted by Malware in Ad-Based images.

191, 970 bad ads and an estimated 1 million users have been impacted by a Malware in Ad-based images, researchers have discovered. A massive adware campaign that hides malware in image files using steganography techniques has impacted up to a million Mac users. When a user clicks on an infected image, the malicious ad infects the Mac user with the Shlayer trojan. Source: Threatpost The post Mac Users targeted by Malware in Ad-Based images. appeared first on IT Security Guru.