April 7, 2022 at 02:23AM

■■■■□ CVE-2022-1232: Type Confusion in V8. Reported by Sergei Glazunov of Google Project Zero on 2022-03-30. https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop.html https://www.forbes.com/sites/gordonkelly/2022/04/05/google-chrome-warning-new-hack-attack-vulnerability-upgrade-chrome-now/?sh=62a84d66341d https://t.me/cKure/11142

April 6, 2022 at 03:51PM

■■■□□ Cyber-War: United States sanctions Garantex Exchange and Hydra Dark Web Marketplace Following the Seizure of Hydra by German Authorities. https://www.elliptic.co/blog/5-billion-darknet-market-hydra-seized-by-german-authorities https://t.me/cKure/11141

April 6, 2022 at 03:07PM

■□□□□ Pro Ukraine hacker group shares Data-Leak of Russia based embroideries online at https://leaks.■eve■■e.monster (URL truncated to avoid Data-Leak). https://t.me/cKure/11140

April 6, 2022 at 02:47PM

■■■□□ Almost a Fifth of Global Firms Targeted with Spring4Shell. New vulnerability exploited most widely in Europe https://blog.checkpoint.com/2022/04/05/16-of-organizations-worldwide-impacted-by-spring4shell-zero-day-vulnerability-exploitation-attempts-since-outbreak/ https://t.me/cKure/11139

April 6, 2022 at 12:03PM

■■□□□ Apple Neglects to Patch Two Zero-Day, Wild Vulnerabilities for macOS Big Sur, Catalina. https://www.intego.com/mac-security-blog/apple-neglects-to-patch-zero-day-wild-vulnerabilities-for-macos-big-sur-catalina/ https://t.me/cKure/11138

April 5, 2022 at 10:04AM

■■■□□ Data-Leak from India 🇮🇳 as actors use RAT to hijack superusers at India’s Mahesh Bank, robbing coffers of millions. Bank had no firewall license, intrusion or phishing protection – guess the rest. https://go.theregister.com/feed/www.theregister.com/2022/04/05/mahesh_bank_no_firewall_attack/ https://t.me/cKure/11134

April 4, 2022 at 07:46PM

■■□□□ FIN7 hackers evolve toolset, work with multiple ransomware gangs. Threat analysts have compiled a detailed technical report on FIN7 operations from late 2021 to early 2022, showing that the actor is still very active, evolving, and trying new monetization methods. https://www.bleepingcomputer.com/news/security/fin7-hackers-evolve-toolset-work-with-multiple-ransomware-gangs/ https://t.me/cKure/11133