Content Paint

Vault 33 | Cyber News & Intel

Vault 33 is your ultimate hub for cutting-edge cybersecurity insights, delivering expert analysis, detailed tutorials, research, and the latest updates in threat and vulnerability management.

News  | May 02, 2025
/
Colorful digital lock surrounded by circuit patterns, symbolizing data security and encryption in cybersecurity.
News  | May 02, 2025
/
Cybersecurity cityscape with neon data visualizations, depicting network security, encryption, and cyber threats.
Intel  | May 02, 2025
/
Futuristic data center with glowing circuits and digital displays, symbolizing cybersecurity technology and data protection.
Intel  | Apr 29, 2025
/
Digital lock guardian made of a circuit board in a vibrant cityscape, symbolizing data security and cybersecurity measures against attacks.
Intel  | Apr 29, 2025
/
Digital lock on a circuit board in a vibrant cityscape, symbolizing data security and cybersecurity measures against attacks.
News  | Apr 29, 2025
/
Digital cybersecurity landscape featuring vibrant data streams and security icons, highlighting malware threats and defenses.

Read Our Latest Posts

Latest Posts

386 Posts
Chinese Lidar Sensors Pose A Significant Risk To US Defense Equipment

The growing reliance on Chinese-manufactured LiDAR (Light Detection and Ranging) sensors in U.S. defense systems and critical infrastructure has raised alarms about national security vulnerabilities. These sensors, which use laser pulses to generate high-resolution 3D maps, are critical to applications ranging from autonomous vehicles to missile guidance systems. However,

Rockstar 2FA phishing service targets Microsoft 365 accounts in new attacks

A sophisticated phishing-as-a-service platform named Rockstar 2FA has recently surfaced, designed to conduct extensive adversary-in-the-middle (AiTM) attacks targeting Microsoft 365 credentials. Rockstar 2FA, a newly identified PhaaS platform, enables cybercriminals to execute large-scale phishing operations. This service is specifically engineered to exploit two-factor authentication (2FA) by intercepting and capturing sensitive

Russia arrests cybercriminal Wazawaka for ties with ransomware gangs

Mikhail Pavlovich Matveev, a Russian national known by aliases such as Wazawaka, Uhodiransomwar, m1x, and Boriselcin, has been apprehended in Russia for his alleged connections to several notorious hacking groups. Matveev is accused of developing ransomware aimed at encrypting data from commercial entities to demand a ransom for decryption. Arrest

U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider

In a recent security development, U.S. telecom giant T-Mobile discovered efforts by cybercriminals to breach its network. However, the company assured that no sensitive information was accessed during these attempts. According to Jeff Simon, T-Mobile's Chief Security Officer, the intrusions were traced back to a wireline provider&

U.S. Citizen Sentenced for Spying on Behalf of China's Intelligence Agency

A U.S. citizen originally from China has been sentenced to four years in prison following his admission to spying on behalf of China's Ministry of State Security. Ping Li, 59, residing in Wesley Chapel, Florida, engaged in espionage by transferring confidential information from his employers to Chinese

More than Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP

Experts have uncovered significant security vulnerabilities in Advantech EKI industrial wireless access points, potentially allowing attackers to bypass authentication and execute remote code at elevated privilege levels. Overview of Vulnerabilities According to Nozomi Networks' latest analysis, these flaws present critical threats, enabling unauthenticated remote code execution with root permissions,

Tor needs 200 new WebTunnel bridges to fight censorship

In a decisive move to bolster privacy and resist governmental censorship, the Tor Project is reaching out to its supporters to deploy 200 additional WebTunnel bridges by year-end. The Tor Project is recognized for its pivotal role in promoting online privacy through its anonymous browsing tools. This current appeal underscores

Automated Hunting with Censeye

Censys offers rich, detailed data that often requires a trained eye to recognize its full potential. This article explores how they leverage this information to uncover suspicious infrastructure and introduce their new tool, Censeye, designed to assist in this process. Innovative Pivoting Techniques Years of analyzing Censys data reveal distinct

Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours

Cloudflare, a leader in internet security, reported a significant glitch in its logging system that resulted in the loss of 55% of customer logs for a 3.5-hour duration. The issue stemmed from a bug in the log collection service, disrupting the delivery of event logs to users. Cloudflare'

Browse by Tags

4 Tags
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.