Blog

214 Results / Page 3 of 22

Background
T-Mobile confirms it was hacked in recent wave of telecom breaches

todayNovember 17, 2024

close

Computer Forensic joe h

T-Mobile confirms it was hacked in recent wave of telecom breaches

Digital Forensics: T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement information requests. “T-Mobile is closely monitoring this industry-wide attack, and at this time, T-Mobile systems and data have not been ...

Remembering When Satoshi Nakamoto’s Emails Were Hacked

todayNovember 9, 2024

close

Computer Forensic ThorTech

Remembering When Satoshi Nakamoto’s Emails Were Hacked

Digital Forensics: By Mark Hunter 1 day agoFri Nov 08 2024 08:30:42 Reading Time: 2 minutes Satoshi Nakamoto’s email account was hacked ten years ago, which threatened to expose his identity The hack led to unauthorized messages being sent under Nakamoto’s name, sparking fears and confusion about Bitcoin’s security Questions ...

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

todayNovember 5, 2024

close

Computer Forensic Expert joe h

Custom “Pygmy Goat” malware used in Sophos Firewall hack on govt network

Computer Forensics Company: UK’s National Cyber Security Centre (NCSC) has published an analysis of a Linux malware named “Pigmy Goat” created to backdoor Sophos XG firewall devices as part of recently disclosed attacks by Chinese threat actors. Last week, Sophos published a series of reports dubbed “Pacific Rim” that detailed five-year ...

Hacked TP-Link routers at center of massive botnet used to attack Azure customers

todayNovember 4, 2024

close

Computer Forensic Sewa

Hacked TP-Link routers at center of massive botnet used to attack Azure customers

Digital Forensics: Serving tech enthusiasts for over 25 years. TechSpot means tech analysis and advice you can trust. In context: CovertNetwork-1658 is a stark reminder of the ongoing cat-and-mouse game between cybersecurity professionals and threat actors. Using compromised devices as part of a botnet also underscores the importance of securing IoT devices ...

Thousands of hacked TP-Link routers used in years-long account takeover attacks

todayNovember 4, 2024

close

Computer Forensic Sewa

Thousands of hacked TP-Link routers used in years-long account takeover attacks

Digital Forensics: Hackers working on behalf of the Chinese government are using a botnet of thousands of routers, cameras, and other Internet-connected devices to perform highly evasive password spray attacks against users of Microsoft’s Azure cloud service, the company warned Thursday. The malicious network, made up almost entirely of TP-Link ...

Microsoft: Chinese hackers use Quad7 botnet to steal credentials

todayNovember 2, 2024

close

Computer Forensic joe h

Microsoft: Chinese hackers use Quad7 botnet to steal credentials

Digital Forensics: Microsoft warns that Chinese threat actors use the Quad7 botnet, compromised of hacked SOHO routers, to steal credentials in password-spray attacks. Quad7, also known as CovertNetwork-1658 or xlogin, is a botnet first discovered by security researcher Gi7w0rm that consists of compromised SOHO routers. Later reports by Sekoia and Team Cymru ...

 


LOGO

 

  • info@thorsolution.com


Products


Company


Contacts

Support