Telegram Suffers ‘Powerful DDoS Attack’ From China During Hong Kong Protests

Posted by & filed under Security News.

Telegram, one of the most popular encrypted messaging app, briefly went offline yesterday for hundreds of thousands of users worldwide after a powerful distributed denial-of-service (DDoS) attack hit its servers. Telegram founder Pavel Durov later revealed that the attack was mainly coming from the IP addresses located in China, suggesting the Chinese government could be… Read more »

Cryptocurrency Firm Hacked Its Customers to Protect Their Funds From Hackers

Posted by & filed under Security News.

Are you using Komodo’s Agama Wallet to store your KMD and BTC cryptocurrencies? Were your funds also un-authorisedly transferred overnight to a new address? If yes, don’t worry, it’s probably safe, and if you are lucky, you will get your funds back. Komodo, a cryptocurrency project and developer of Agama wallet, adopted a surprisingly unique… Read more »

Cybercriminals Competing for Cryptocurrency Mining Foothold

Posted by & filed under Security News.

The Pacha Group is a threat actor discovered by Intezer and profiled in a blog post published on February 28, 2019. Dating back to September 2018 the Pacha Group has deployed undetected crypto-mining malware to infiltrate Linux servers and mine cryptocurrency without user permissions. One of the more notable observations discerned by Intezer researchers was the… Read more »

Core Elastic Stack Security Features Now Available For Free Users As Well

Posted by & filed under Security News.

Elastic, the company behind the most widely used enterprise search engine ElasticSearch and the Elastic Stack, today announced that it has decided to make core security features of the Elastic Stack free and accessible to all users. ELK Stack or Elastic Stack is a collection of three powerful open source projects—Elasticsearch, Logstash, and Kibana—that many… Read more »

Project Zero

Posted by & filed under Security News.

Project Zero’s team mission is to “make zero-day hard”, i.e. to make it more costly to discover and exploit security vulnerabilities. They primarily achieve this by performing their own security research, but at times they also study external instances of zero-day exploits that were discovered “in the wild”. These cases provide an interesting glimpse into… Read more »