Category: Threat Intel Reports


  • Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year

    * ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Spamming – Adware](/categories/spamming-adware/) Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year===================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0…


  • Unmasking online threats – How a VPN ensures security and safety

    * ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Useful – Informative](/categories/useful-informative/) Unmasking online threats — How a VPN ensures security and safety=================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0 0* ![OTA](https://www.onlinethreatalerts.com/images/eye.png)…


  • Massive VW Group Data Leak Exposed 800,000 EV Owners’ Movements, From Homes To Brothels

    Thanos Pappas reports: Many people worry about hackers stealing their personal data, but sometimes, the worst breaches come not from…


  • White House links ninth telecom breach to Chinese hackers

    ![Chinese hacker](https://www.bleepstatic.com/content/hl-images/2024/05/22/Chinese_hackers.png)A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a…


  • North Korea actors use OtterCookie malware in Contagious Interview campaign

    North Korea-linked threat actors are using the OtterCookie backdoor to target software developers with fake job offers.———————————————————————————————————————–North Korea-linked threat actors…


  • 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

    ![New Exploit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEM4Efw4NqigkpMJJ2VA_agA2oS2brssc6OLY4vJoz7cqi9kgYhNRAtSfJV9BE3bqguhsOj-nlfg7NrG8qoW6BgRmIKwDksdSJrz19_WogbmREJ8Dk399t8KJ9W9O_1bhSDzCMR-coAXcd-zNYDqKaVgoFiS-A8o5HoyetT4TEtW1Ph0_V9p9yYn3B0FqD/s728-rw-e365/router.png ‘New Exploit’)A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to…


  • Attacks by APTC60 Group Exploiting Legitimate Services

    The APT-C-60 group targeted organizations in Japan and East Asia with a sophisticated attack campaign. The attack begins with a…


  • Gaming Engines: An Undetected Playground for Malware Loaders

    Check Point Research uncovered a new technique exploiting the Godot Engine to execute malicious GDScript code, remaining undetected by most…


  • Cryptohack Roundup: FBI Fingers TraderTraitor for $308M Hack

    [Blockchain -& Cryptocurrency](https://www.govinfosecurity.com/blockchain-cryptocurrency-c-483) , [Cryptocurrency Fraud](https://www.govinfosecurity.com/cryptocurrency-fraud-c-574) , [Fraud Management -& Cybercrime](https://www.govinfosecurity.com/fraud-management-cybercrime-c-409)Cryptohack Roundup: FBI Fingers TraderTraitor for $308M Hack============================================================Also: Bitfinex Hacker…


  • Year In Review: Australia Expands Cyber Regulation

    [Geo-Specific](https://www.govinfosecurity.com/geo-specific-c-518) , [Standards, Regulations -& Compliance](https://www.govinfosecurity.com/standards-regulations-compliance-c-435)Year In Review: Australia Expands Cyber Regulation==================================================2024 Marked the Government’s Increasing Role Mandating Cybersecurity [Jayant…