Cybersecurity

Russia Undertakes Disinformation Campaign Across Africa

Russia has launched sympathetic media outlets, courted anti-French public support, and created fake civil society organizations in turbulent African states, according to an investigation by Microsoft. The computing giant’s report noted that coups in Mali, Guinea, Burkina Faso, Niger, and Gabon have brought instability to the continent, and Russia is capitalizing upon this instability with a […]

Cybersecurity

Alert: Apache Superset Vulnerabilities Expose Servers to Remote Code Execution Attacks

Sep 07, 2023THNServer Security / Vulnerability Patches have been released to address two new security vulnerabilities in Apache Superset that could be exploited by an attacker to gain remote code execution on affected systems. The update (version 2.1.1) plugs CVE-2023-39265 and CVE-2023-37941, which make it possible to conduct nefarious actions once a bad actor is […]

DJing

Premiere – Ukraine’s Omon Breaker shares techno groover ‘Aldea Malvada’ from first full ever EP | Juno Daily

Now Berlin-based, he delivers some serious BITE Omon Breaker aka Maksym Nazarov is a DJ and musician who grew up in Kyiv, Ukraine and was originally from Dnipro. He drops his first ever full EP, ‘Compromat’ on the BITE label on September 29, traversing from cyberpunk dancefloor techno to trance-like work outs and wave inflected anthems across […]

Cybersecurity

Mirai Botnet Variant ‘Pandora’ Hijacks Android TVs for Cyberattacks

Sep 07, 2023THNBotnet / Cyber Threat A Mirai botnet variant called Pandora has been observed infiltrating inexpensive Android-based TV sets and TV boxes and using them as part of a botnet to perform distributed denial-of-service (DDoS) attacks. Doctor Web said the compromises are likely to occur either during malicious firmware updates or when applications for […]

Cybersecurity

Outlook Breach: Microsoft Reveals How a Crash Dump Led to a Major Security Breach

Sep 07, 2023THNCyber Attack / Email Hacking Microsoft on Wednesday revealed that a China-based threat actor known as Storm-0558 acquired the inactive consumer signing key to forge tokens and access Outlook by compromising an engineer’s corporate account. This enabled the adversary to access a debugging environment that contained information pertaining to a crash of the […]