Hackers Using New Attack (Not Just Ransomware)

Here is the story from scmagazine: MOVEit hackers may have found simpler business model beyond ransomware “The Russian-speaking hacker group Cl0p confirmed it exploited a zero-day vulnerability in the popular MOVEit file transfer program and stole data from a growing number of victims, exposing the personal information of many millions of people worldwide.”   What … Read more

Windows11 — Upgrade Soon?

Windows10 arrived not that long ago… According to Microsoft’s site learn.microsoft.com 1507 was the first version and it had an initial release at 2015-07-29 so about 8 years ago it was released, and now the last version  22H2 will have a last service date of  2025, Oct 14th 22H2 General Availability Channel 2022-10-18 2023-05-23 19045.3031 … Read more

WAGO Controllers Vulnerable to Remote Command Execution

Several types of WAGO Controllers (I/O) have RCE vulnerabilities according to OneKey    got the info from CERT (Computer Emergency Response Team) Here is the list from CERT: Article No° Product Name Affected Version(s) 751-9301 Compact Controller CC100 FW20 <= FW22 751-9301 Compact Controller CC100 = FW23 752-8303/8000-002 Edge Controller = FW22 750-81xx/xxx-xxx PFC100 FW20 … Read more

AI Can Be Dangerous For Cyberdefense or Privacy

AI or Artificial Intelligence is the latest buzzword which means many things in the spectrum of computerized or automated instructions.  There is machine learning neural logic and more, but let’s ask a GPT (Generative Pre-Trained Transformer) or https://martech.zone/acronym/gpt/ I asked you.com (a GPT AI site about types of Artifical Intelligence) Answer: There are several ways … Read more

More Pig Butchering or “Sha Zhu Pan”

Cybernews.com has a story on another incidence of Pig Butchering… As some youtube personalities with Chinese knowledge mentioned pig butchering refers to raising a pig to be ultimately butchered.  So one plays the long game, where one befriends an opposite sex person with carefully cultivated stories. As the person slowly trusts the scam which initially … Read more