Full Name
Nick Valentine
Location
Chicago, IL
Nick Valentine's Work
382 Posts
The Attack and Its Perpetrators Salt Typhoon, also identified as Earth Estries, FamousSparrow, Ghost Emperor, and UNC2286, has been actively compromising government and telecom networks in Southeast Asia since at least 2019. The group’s latest known victim, an American telecom company, emerged after the Biden administration published new guidelines
The Apache Software Foundation (ASF) has released updates to address a severe SQL injection vulnerability in Apache Traffic Control, identified as CVE-2024-45387. Facing a critical Common Vulnerability Scoring System (CVSS) score of 9.9, this flaw impacts the robust Traffic Control solution, which allows operators to establish scalable and distributed
A Brazilian national has been indicted in the United States for cyber extortion after allegedly breaching a substantial number of user accounts and demanding a hefty ransom in Bitcoin. Defendant Junior Barros De Oliveira, aged 29, hailing from Curitiba, Brazil. Indictment Filed by the U.S. Department of Justice (DoJ)
On December 23, 2024, Pittsburgh Regional Transit (PRT) disclosed it was contending with a ransomware attack, discovered initially on December 19. This breach notably disrupted transit services across the Pittsburgh metropolitan area, which PRT serves by operating a diverse array of transportation options, including buses, light rail, and incline services.
A Romanian man, Daniel Christian Hulea, has been sentenced to 20 years in prison following his pivotal involvement in the notorious NetWalker ransomware attacks. Hulea, 30, entered a guilty plea to charges of computer and wire fraud conspiracy on June 20 after admitting to extorting around $21.5 million in
Cybersecurity experts have raised alarms about threat actors exploiting a newly uncovered vulnerability in Apache Struts—labeled CVE-2024-53677. This flaw carries a critical CVSS score of 9.5, underscoring its severity. Exploiting this vulnerability could allow attackers to upload harmful files, leading to potential remote code execution. According to an
Mark Sokolovsky, a Ukrainian citizen, has received a five-year prison sentence for his pivotal role in the notorious Raccoon Stealer malware operation. Court documents reveal that Sokolovsky, known by aliases such as raccoon-stealer, Photix, and black21jack77777, collaborated with co-conspirators to distribute the malware through a MaaS (malware-as-a-service) model, charging $75
Phishing attacks are evolving as cybercriminals find creative ways to infiltrate user inboxes. A recent campaign is exploiting Google Calendar invites and Google Drawings to deceitfully harvest user credentials while evading spam detection. Platform Abuse The tactic leverages Google Calendar invites, cleverly embedding phishing links within event descriptions or attachments.
The Russia-linked cyber espionage unit APT29—known by various aliases including Cozy Bear and Nobelium—has adapted red teaming tactics to perpetrate rogue RDP attacks. This campaign, primarily targeting governmental and academic sectors, marks a sophisticated step in the group's cyber activities. Cyber Group Identity APT29, also recognized