Phoenix IT

Category: Cyber Warfare

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

PyPI Repository Found Hosting Fake Crypto Wallet Recovery Tools That Steal User Data

A new set of malicious packages has been unearthed in the Python Package Index (PyPI) repository that masqueraded as cryptocurrency wallet recovery and management services, only to siphon sensitive data and facilitate the theft of valuable digital assets. “The attack targeted users of Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus, and other prominent wallets in

Read More
A Hacker’s Era: Why Microsoft 365 Protection Reigns Supreme

A Hacker’s Era: Why Microsoft 365 Protection Reigns Supreme

Imagine a sophisticated cyberattack cripples your organization’s most critical productivity and collaboration tool — the platform you rely on for daily operations. In the blink of an eye, hackers encrypt your emails, files, and crucial business data stored in Microsoft 365, holding it hostage using ransomware. Productivity grinds to a halt and your IT team

Read More
Dozens of Hezbollah members wounded after hacked pagers explode in Lebanon

Dozens of Hezbollah members wounded after hacked pagers explode in Lebanon

Dozens of members of Hezbollah have been seriously wounded on Tuesday across Lebanon when the handheld pagers they use to communicate exploded, Lebanese state media and officials said. Iran’s ambassador to Lebanon, Mojtaba Amani, was among those injured by the pager explosions, Iran’s Mehr news agency reported. A Hezbollah official, speaking on condition of anonymity,

Read More
Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal

Mirai Botnet targeting OFBiz Servers Vulnerable to Directory Traversal

Enterprise Resource Planning (ERP) Software is at the heart of many enterprising supporting human resources, accounting, shipping, and manufacturing. These systems can become very complex and difficult to maintain. They are often highly customized, which can make patching difficult. However, critical vulnerabilities keep affecting these systems and put critical business data at risk. The SANS

Read More