• (919) 519-1227
  • info@ctgint.us
  • 1903 North Harrison Avenue, Suite 200 Cary, NC 27513. United States

Blogs

Security researcher updates OMG Cables to record user keystrokes

Security researcher Mark Green, (who goes by MG) has revealed to the Vices team at Motherboard that he and his team have upgraded their version of a hacked Lightning cable in a way that allows a hacker to record keystrokes and then to send the data to a designated site. This would allow the device to be used to steal passwords…

Read More

Why You Should Stop Using Your Facebook Messenger App

If you’re one of Facebook Messenger’s 1.3 billion users, then you have just been given a serious reason to quit. While recent headlines suggest the platform is adding new security protections, there’s a nasty twist which makes this more risky than it seems, raising new questions about Facebook and its secretive backend systems. While Apple’s controversial CSAM update and surprise backtrack…

Read More

Wireless key-logger hidden inside USB-C to Lightning cable

A USB-C to Lightning cable with a hidden wireless key-logger can enable an attacker to capture everything you type from a distance of up to a mile. Any tech-literate person knows you should never plug a USB key into any of your devices unless you trust the person giving it to you, but fewer know that the same applies…

Read More

Ransomware gang’s script shows exactly the files they’re after

When ransomware gangs compromise a network, they usually start with limited access to a single device. The threat actors use this stolen data in two ways.

Read More

16-Year-Old Security Bug Affects Millions of HP, Samsung, Xerox Printers

Details have emerged about a high severity security vulnerability affecting a software driver used in HP, Xerox, and Samsung printers that has remained undetected since 2005. Tracked as CVE-2021-3438 (CVSS score: 8.8), the issue concerns a buffer overflow in a print driver installer package named “SSPORT.SYS” that can enable remote privilege and arbitrary code execution. Hundreds of millions of printers have…

Read More

Biden Administration Blames Hackers Tied to China for Microsoft Cyber Attack Spree

Four Chinese nationals were indicted over separate hacking activity; dozens of nations condemn Beijing’s state-sponsored hacking WASHINGTON—The Biden administration publicly blamed hackers affiliated with China’s main intelligence service for a far-reaching cyberattack on Microsoft Corp. email software this year, part of a global effort by dozens of nations to condemn Beijing’s malicious cyber activities. The U.S. government has high confidence that…

Read More

Ransomware breach at Florida IT firm hits 200 businesses

WASHINGTON, July 2 (Reuters) – Hundreds of American businesses were hit Friday by an unusually sophisticated ransomware attack that hijacked widely used technology management software from a Miami-based supplier called Kaseya. The attackers changed a Kaseya tool called VSA, used by companies that manage technology at smaller businesses. They then encrypted the files of those providers’ customers simultaneously. Security…

Read More

Ransomware attacks are closing schools, delaying chemotherapy and derailing everyday life

After years of warnings, the impact of ransomware finally hits home for regular people. SAN FRANCISCO — It can feel abstract: A group of organized but faceless criminals hijacking corporate computer systems and demanding millions of dollars in exchange for their safe return. But the impact of these ransomware attacks is increasingly, unavoidably, real for everyday people. These crimes have resulted…

Read More

This is how long hackers will hide in your network before deploying ransomware or being spotted

Any time is too long, but hackers are finding ways to wander through networks unseen for longer than you might expect. Cyberattackers on average have 11 days after breaching a target network before they’re being detected, according to UK security firm Sophos – and often when they are spotted it’s because they’ve deployed ransomware. As Sophos researchers note in a…

Read More

A huge trove of credit card records and Social Security numbers just got hacked

Not a week goes by anymore, it seems like, when we don’t have multiple hacks to report on, as well as a fresh data breach or systems intrusion on the part of attackers constantly probing for weaknesses anywhere that consumer records are stored. Many of these episodes garner headlines simply because of the scale of the data breach and the target…

Read More