Content Paint

Author Info

Full Name

Nick Valentine

Location

Chicago, IL

Nick Valentine's Work

382 Posts
Nick Valentine
White House links ninth telecom breach to Chinese hackers

The Attack and Its Perpetrators Salt Typhoon, also identified as Earth Estries, FamousSparrow, Ghost Emperor, and UNC2286, has been actively compromising government and telecom networks in Southeast Asia since at least 2019. The group’s latest known victim, an American telecom company, emerged after the Biden administration published new guidelines

Apache Addresses Critical SQL Injection Vulnerability in Apache Traffic Control

The Apache Software Foundation (ASF) has released updates to address a severe SQL injection vulnerability in Apache Traffic Control, identified as CVE-2024-45387. Facing a critical Common Vulnerability Scoring System (CVSS) score of 9.9, this flaw impacts the robust Traffic Control solution, which allows operators to establish scalable and distributed

Brazilian Hacker Charged with Extorting $3.2M in Bitcoin After Compromising 300,000 Accounts

A Brazilian national has been indicted in the United States for cyber extortion after allegedly breaching a substantial number of user accounts and demanding a hefty ransom in Bitcoin. Defendant Junior Barros De Oliveira, aged 29, hailing from Curitiba, Brazil. Indictment Filed by the U.S. Department of Justice (DoJ)

Ransomware Attack Disrupts Services at Pittsburgh Regional Transit

On December 23, 2024, Pittsburgh Regional Transit (PRT) disclosed it was contending with a ransomware attack, discovered initially on December 19. This breach notably disrupted transit services across the Pittsburgh metropolitan area, which PRT serves by operating a diverse array of transportation options, including buses, light rail, and incline services.

Romanian national was sentenced to 20 years in prison for his role in NetWalker ransomware attacks

A Romanian man, Daniel Christian Hulea, has been sentenced to 20 years in prison following his pivotal involvement in the notorious NetWalker ransomware attacks. Hulea, 30, entered a guilty plea to charges of computer and wire fraud conspiracy on June 20 after admitting to extorting around $21.5 million in

Threat Actors Actively Exploiting Apache Struts Vulnerability CVE-2024-53677

Cybersecurity experts have raised alarms about threat actors exploiting a newly uncovered vulnerability in Apache Struts—labeled CVE-2024-53677. This flaw carries a critical CVSS score of 9.5, underscoring its severity. Exploiting this vulnerability could allow attackers to upload harmful files, leading to potential remote code execution. According to an

Raccoon Stealer Malware Operator Sentenced to 5 Years in Prison After Guilty Plea

Mark Sokolovsky, a Ukrainian citizen, has received a five-year prison sentence for his pivotal role in the notorious Raccoon Stealer malware operation. Court documents reveal that Sokolovsky, known by aliases such as raccoon-stealer, Photix, and black21jack77777, collaborated with co-conspirators to distribute the malware through a MaaS (malware-as-a-service) model, charging $75

Ongoing Phishing Campaign Exploits Google Calendar to Evade Spam Filters

Phishing attacks are evolving as cybercriminals find creative ways to infiltrate user inboxes. A recent campaign is exploiting Google Calendar invites and Google Drawings to deceitfully harvest user credentials while evading spam detection. Platform Abuse The tactic leverages Google Calendar invites, cleverly embedding phishing links within event descriptions or attachments.

Russia-Linked APT29 Utilizes Red Team Tools in Rogue RDP Cyberattacks

The Russia-linked cyber espionage unit APT29—known by various aliases including Cozy Bear and Nobelium—has adapted red teaming tactics to perpetrate rogue RDP attacks. This campaign, primarily targeting governmental and academic sectors, marks a sophisticated step in the group's cyber activities. Cyber Group Identity APT29, also recognized

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.