Remove 11
article thumbnail

Ring Gives Videos to Police without a Warrant or User Consent

Schneier on Security

Amazon has revealed that it gives police videos from its Ring doorbells without a warrant and without user consent. confirming that there have been 11 cases in 2022 where Ring complied with police “emergency” requests. Ring recently revealed how often the answer to that question has been yes.

Access 115
article thumbnail

Fla. Man Charged in SIM-Swapping Spree is Key Suspect in Hacker Groups Oktapus, Scattered Spider

Krebs on Security

technology companies during the summer of 2022. stole at least $800,000 from at least five victims between August 2022 and March 2023. 2022 that an intrusion had exposed a “limited number” of Twilio customer accounts through a sophisticated social engineering attack designed to steal employee credentials.

Passwords 326
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem

Security Affairs

Aurora Stealer is an info-stealing malware that was first advertised on Russian-speaking underground forums in April 2022. In October and November 2022, the researchers analyzed several hundreds of collected samples and identified dozens of active C2 servers. ” reads the analysis by the experts.

article thumbnail

CPPA Holding Public Pre-Rulemaking Meetings on the CPRA on March 29 and March 30

Hunton Privacy

On March 29 and March 30, 2022, the California Privacy Protection Agency (“CPPA”) will hold public pre-rulemaking informational sessions regarding the California Privacy Rights Act (“CPRA”) via video conference.

Sales 108
article thumbnail

Attackers abused the popular TikTok Invisible Challenge to spread info-stealer

Security Affairs

People participating in the Invisible Challenge have to apply a filter called Invisible Body that removes the character’s body from a video, in which they pose naked, making a blurred contour image of it. TikTok videos posted by the threat actors behind this campaign have already reached over a million views in just a couple of days.

article thumbnail

EnemyBot malware adds new exploits to target CMS servers and Android devices

Security Affairs

CVE Number Affected devices CVE-2021-44228, CVE-2021-45046 Log4J RCE CVE-2022-1388 F5 BIG IP RCE No CVE (vulnerability published on 2022-02) Adobe ColdFusion 11 RCE CVE-2020-7961 Liferay Portal – Java Unmarshalling via JSONWS RCE No CVE (vulnerability published on 2022-04) PHP Scriptcase 9.7

CMS 143
article thumbnail

Security Affairs newsletter Round 404 by Pierluigi Paganini

Security Affairs

GoTo revealed that threat actors stole customers’ backups and encryption key for some of them FBI confirms that North Korea-linked Lazarus APT is behind Harmony Horizon Bridge $100 million cyber heist Meta Platforms expands features for EE2E on Messenger App CISA added Zoho ManageEngine RCE (CVE-2022-47966) to its Known Exploited Vulnerabilities Catalog (..)