Sun.Feb 05, 2023

article thumbnail

Finland’s Most-Wanted Hacker Nabbed in France

Krebs on Security

Julius “Zeekill” Kivimäki, a 25-year-old Finnish man charged with extorting a local online psychotherapy practice and leaking therapy notes for more than 22,000 patients online, was arrested this week in France. A notorious hacker convicted of perpetrating tens of thousands of cybercrimes, Kivimäki had been in hiding since October 2022, when he failed to show up in court and Finland issued an international warrant for his arrest.

ROT 229
article thumbnail

Forget the IoT. Meet the IoZ: our Internet of Zombie things

The Security Ledger

A school that never sleeps? Cameras that go dark? A dead company hacked back to life? Welcome to the growing Internet of Zombie devices that threatens the security of the Internet. The post Forget the IoT. Meet the IoZ: our Internet of Zombie things appeared first on The Security Ledger with Paul F. Roberts. Related Stories CES Overlooks New Report That Finds Auto Cyber Is A Dumpster Fire The Future of IoT Security Standards IoCs vs.

IoT 98

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT

Security Affairs

Microsoft attributes a recent cyber attack against the satirical French magazine Charlie Hebdo to an Iran-linked NEPTUNIUM APT group. Microsoft’s Digital Threat Analysis Center (DTAC) attributes a recent cyberattacks against the satirical French magazine Charlie Hebdo to an Iran-linked threat actor tracked as NEPTUNIUM (aka Emennet Pasargad , Holy Souls).

article thumbnail

TikTok: how the west has turned on gen Z’s favourite app

The Guardian Data Protection

US and European fears about China exploiting TikTok’s data harvest and promoting Beijing’s worldview look set to inspire an urgent overhaul in data privacy laws The FBI has called it a national security threat. The US government has passed a law forcing officials to delete it from their phones. Texas senator Ted Cruz has denounced it as “a Trojan horse the Chinese Communist party can use to influence what Americans see, hear, and ultimately think”.

article thumbnail

Beware of Pixels & Trackers: A Client-Side Security Report

At the beginning of 2023, concern grew over pixels and trackers, which load into the browser as a part of the software supply chain, being used by data harvesting platforms to collect user data. The data is then transferred to the servers of the companies owning the pixels/trackers as a part of their advertising and marketing business. Aggressive data harvesting practices increase the likelihood and/or actual transfer of sensitive data, which may cause unintended consequences, including expensiv

article thumbnail

Security Affairs newsletter Round 405 by Pierluigi Paganini

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for you in your email box. If you want to also receive for free the newsletter with the international press subscribe here. CISA adds Oracle, SugarCRM bugs to its Known Exploited Vulnerabilities Catalog GoAnywhere MFT zero-day flaw actively exploited CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers Tallahassee Memorial HealthCare, Florida,