Cybersecurity News
Bluetooth Bugs Open Billions of Devices to DoS, Code Execution

Gift Card Gang Extracts Cash From 100k Inboxes Daily
Some of the most successful and lucrative online scams employ a "low-and-slow" approach -- avoiding detection or interference from researchers and law enforcement agencies by stealing small bits of cash from many people over an extended period. Here's the story of a cybercrime group that compromises up to 100,000 email inboxes per day, and apparently does little else with this access except siphon gift card and customer loyalty program data that can be resold online.Google Play Sign-Ins Allow Covert Location-Tracking

Twitter introduces new feature to automatically block abusive behavior
Dubbed Safety Mode, the feature will temporarily block authors of offensive tweets from being able to contact or follow users.
The post Twitter introduces new feature to automatically block abusive behavior appeared first on WeLiveSecurity
Cisco Patches Critical Authentication Bug With Public Exploit

8-digit BINs and PCI DSS: What You Need to Know
Did you know that there are changes coming in how the Bank Identification Number (BIN, also known as Issuer Identification Number, or IIN) is encoded and used on payment cards?
This initial post in a series of blog entries will highlight some of the PCI SSC FAQs that address specific questions related to 8-digit BINs. Upcoming posts will clarify ways in which to determine how 8-digit BINs may affect your environment; the effect of 8-digit BINs on encryption, masking, and truncation formats; and how multiple truncation formats can affect scoping and security requirements.
7 Ways to Defend Mobile Apps, APIs from Cyberattacks

WhatsApp Photo Filter Bug Allows Sensitive Info to Be Lifted

Digital State IDs Start Rollouts Despite Privacy Concerns

Comcast RF Attack Leveraged Remotes for Surveillance

15-Year-Old Malware Proxy Network VIP72 Goes Dark
Over the past 15 years, a cybercrime anonymity service known as VIP72 has enabled countless fraudsters to mask their true location online by routing their traffic through millions of malware-infected systems. But roughly two week ago, VIP72's online storefront -- which sold access to more than 30,000 compromised PCs -- simply vanished.Gutenberg Template Library & Redux Framework Bugs Plague WordPress Sites

LockBit Jumps Its Own Countdown, Publishes Bangkok Air Files

BEC Scammers Seek Native English Speakers on Underground

Feds Warn of Ransomware Attacks Ahead of Labor Day

This is why the Mozi botnet will linger on
The botnet continues to haunt IoT devices, and likely will for some time to come.Cream Finance platform pilfered for over $34 million in cryptocurrency
The project has promised to cover losses suffered by its users.Scam artists are recruiting English speakers for business email campaigns
Finding fluent speakers is becoming important to criminals conducting business-based attacks.Fortress Home Security Open to Remote Disarmament

Cream Finance DeFi Platform Rooked For $29M
