Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2022-2513

A vulnerability exists in the Intelligent Electronic Device (IED) Connectivity Package (ConnPack) credential storage function in Hitachi Energy’s PCM600 product included in the versions listed below, where IEDs credentials are stored in a cleartext format in the PCM600 database. An attacker who manages to get access to the exported backup file can exploit the vulnerability and obtain credentials of the IEDs. The credentials may be used to perform unauthorized modifications such as loading incorrect configurations, reboot the IEDs or cause a denial-of-service on the IEDs.

CVE
#vulnerability#dos#intel#auth
Luna Moth Gang Invests in Call Centers to Target Businesses with Callback Phishing Campaigns

The Luna Moth campaign has extorted hundreds of thousands of dollars from several victims in the legal and retail sectors. The attacks are notable for employing a technique called callback phishing or telephone-oriented attack delivery (TOAD), wherein the victims are social engineered into making a phone call through phishing emails containing invoices and subscription-themed lures. Palo Alto

U.S. Authorities Seize Domains Used in 'Pig butchering' Cryptocurrency Scams

The U.S. Justice Department (DoJ) on Monday announced the takedown of seven domain names in connection to a "pig butchering" cryptocurrency scam. The fraudulent scheme, which operated from May to August 2022, netted the actors over $10 million from five victims, the DoJ said. Pig butchering, also called Sha Zhu Pan, is a type of scam in which swindlers lure unsuspecting investors into sending

Deciphering Value in Generative Art: Art Basel Miami Beach to Feature Tezos Blockchain NFTs

By Owais Sultan This year, visitors to the gallery will be able to mint and claim a featured generative art NFT in real time. This is a post from HackRead.com Read the original post: Deciphering Value in Generative Art: Art Basel Miami Beach to Feature Tezos Blockchain NFTs

Identity Security Needs Humans and AI Working Hand in Hand

In the cybersecurity world, augmenting the human touch with artificial intelligence has produced extremely positive results.

Google Releases YARA Rules to Disrupt Cobalt Strike Abuse

The popular pen-testing tool is often cracked and repurposed by threat actors. Google now has a plan to address that.

Researchers Reveal Details of New Threats: AXLocker, Octocrypt and Alice Ransomware

By Deeba Ahmed AXLocker ransomware is now known as a threat that targets Discord users. This is a post from HackRead.com Read the original post: Researchers Reveal Details of New Threats: AXLocker, Octocrypt and Alice Ransomware