
Drift loses $280 million as hackers seize Security Council powers
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]
Source FileReal-time disclosures, zero-day alerts, and threat intelligence filtered for security leaders.

The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]
Source File
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers in a planned, sophisticated operation. [...]
Source File
The Vergecast is hosting a special in-person screening of Sneakers in partnership with IFC in New York City, and we're opening presale tickets exclusively to Verge subscribers. Sneakers is a movie about what happens when technology becomes more powerful than …
Source File
Special Dinner Invite Email Scam got me. - posted in Virus, Trojan, Spyware, and Malware Removal Help: I was sent a special dinner e-invite from a friend but it appears to be a potential virus. It downloaded a program and when complete it opened Ninite. Acc…
Source File
An exposed Amazon-hosted server allowed anyone to access reams of customer data without needing a password.
Source File
NoVoice can clone people's WhatsApp accounts on different devices, experts warn.
Source File
Researchers warn that residential proxies used to route malicious traffic are a big problem for IP reputation systems, as there is no clear distinction between attackers and legitimate users. [...]
Source File
Sophisticated cyber-espionage campaign recently uncovered targeting government entities in Southeast Asia.
Source File
Threat actors are exploiting vacant homes as "drop addresses" to intercept mail and enable fraud. Flare shows how postal services and fake identities are abused to turn mail into a fraud vector. [...]
Source File
Two vulnerabilities in Progress ShareFile, an enterprise-grade secure file transfer solution, can be chained to enable unauthenticated file exfiltration from affected environments. [...]
Source File
Stryker Corporation, one of the world's leading medical technology companies, says it's fully operational three weeks after many of its systems were wiped out in a cyberattack claimed by the Iranian-linked Handala hacktivist group. [...]
Source File
Fortis Solutions, an enterprise technology partner with decades of experience across infrastructure, cybersecurity, and data systems, approaches artificial intelligence as a force that is redefining how work is performed while preserving the importance of hum…
Source File