iGaming, credential stuffing, gaming

From Dark Web to Jackpot: How Cybercriminals Exploit Stolen Credentials in iGaming

It is essential to address credential stuffing directly and collaborate with the broader iGaming community to mitigate its risks ...
Security Boulevard

Dropbox Sign Breach: Threat Actors Access User Information

In a recent disclosure, cloud storage giant Dropbox revealed a breach affecting its digital signature service, Dropbox Sign (formerly HelloSign). The Dropbox Sign breach, identified on April 24, 2024, compromised user data, ...

Dracula Phishing Platform Targets Organizations Worldwide

In light of recent cyber threats, the Dracula phishing platform has prevailed, targeting organizations in over 100 countries. The Dracula phishing attacks are centered on leveraging an immense network of over 20,000 ...

ChatGPT Plugin Security Vulnerabilities Exploited By Hackers

In the realm of cybersecurity, constant vigilance is paramount as threat actors perpetually seek novel ways to exploit vulnerabilities. Recent research has shed light on a concerning trend: the potential misuse of ...

WordPress Brute-Force Attacks: Sites Used As Staging Ground

In a recent discovery by Sucuri, a concerning trend has emerged involving brute-force attacks on WordPress sites through malicious JavaScript injections. These WordPress brute-force attacks stand out for their stealthy approach. Security ...

MSIX App Installer Disabled Amid Microsoft Malware Attacks

In a recent announcement, Microsoft disclosed its decision to once again disable the ms-appinstaller protocol handler by default amid the Microsoft malware attacks. They took a proactive stance against its exploitation by ...

Bitzlato Founder Money Laundering Cryptocurrency Scandal

In a significant development, Anatoly Legkodymov, the Russian founder of the now-defunct Bitzlato cryptocurrency exchange, has recently pleaded guilty to charges related to operating an unlicensed money-transmitting business. The implications of this ...

Sierra Flaws Cyber Attack: Router Vulnerabilities Unveiled

In a recent scrutiny of Sierra wireless routers, Forescout’s Vedere Labs uncovered 21 novel vulnerabilities that, though relatively straightforward to exploit, pose historical challenges for enterprises to rectify. Forescout’s Vedere Labs outlined ...