Catalin Cimpanu
Catalin Cimpanu
Catalin Cimpanu is a security reporter at ZDNet, where he covers cyber-security, data breaches, hacking, and other related topics. He previously served as security reporter for Bleeping Computer and Softpedia.Source
Europe
CRITIC
img-contested
N/A
1 reviews
PUBLIC
img-contested
N/A
0 reviews
RECENT ARTICLES
gold-cheese75%
Malwarebytes said it was hacked by the same group who breached SolarWinds | ZDNet

Malwarebytes said it was hacked by the same group who breached SolarWinds | ZDNet

Byfor| January 19, 2021 -- 19:02 GMT (11:02 PST)| Topic:US cyber-security firm Malwarebytes today said it was hacked by the same group which breached IT software company SolarWinds last year.A roundup of the best software and apps for Windows and Mac computers, as well as iOS and Android devices, to keep yourself safe from malware and viruses.Malwarebytes said its intrusion is not related to the SolarWinds supply chain incident since the company doesn't use any of SolarWinds software in its internal network. Also:  •  Instead, the security firm said the hackers breached its internal systems...

zdnet.com
Catalin Cimpanu
17h ago
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Google cuts off other Chromium-based browsers from its Sync service | ZDNet

Google cuts off other Chromium-based browsers from its Sync service | ZDNet

By| January 15, 2021 -- 21:38 GMT (13:38 PST)| Topic:Google said today that it caught other Chromium-based browsers piggybacking on its infrastructure and abusing the Chrome Sync service to store their users' data, bookmarks, and browsing history on Google's servers, without approval.Everyone needs a password manager. It's the only way to maintain unique, hard-to-guess credentials for every secure site you and your team access daily.The discovery was made during "a recent audit," Google said today in a .To prevent future abuse, Google said it plans to limit some of the Chrome APIs...

zdnet.com
Catalin Cimpanu
2d ago
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
DuckDuckGo surpasses 100 million daily search queries for the first time | ZDNet

DuckDuckGo surpasses 100 million daily search queries for the first time | ZDNet

Byfor| January 16, 2021 -- 18:26 GMT (10:26 PST)| Topic:Privacy-focused search engine DuckDuckGo reached a major milestone in its 12-year-old history this week when it recorded on Monday its first-ever day with more than 100 million user search queries.The achievement comes after a period of sustained growth the company has been seeing for the past two years, and especially since August 2020, when the search engine began seeing more than 2 billion search queries a month on a regular basis. The numbers are small in comparison to Google's 5 billion daily search queries but it's a positive...

zdnet.com
Catalin Cimpanu
2d ago
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Third malware strain discovered in SolarWinds supply chain attack | ZDNet

Third malware strain discovered in SolarWinds supply chain attack | ZDNet

Byfor| January 12, 2021 -- 01:45 GMT (17:45 PST)| Topic:Cyber-security firm CrowdStrike, one of the companies directly involved in investigating the SolarWinds supply chain attack, said today it identified a third malware strain directly involved in the recent hack. Named Sunspot, this finding adds to the previously discovered Sunburst (Solorigate) and Teardrop malware strains. Also: But while Sunspot is the latest discovery in the SolarWinds hack, Crowdstrike said the malware was actually the first one used. In a , Crowdstrike said that Sunspot was deployed in September 2019, when hackers...

zdnet.com
Catalin Cimpanu
6d ago
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Google reveals sophisticated Windows and Android hacking operation | ZDNet

Google reveals sophisticated Windows and Android hacking operation | ZDNet

Byfor| January 12, 2021 -- 19:59 GMT (11:59 PST)| Topic:Google published a six-part report today detailing a sophisticated hacking operation that the company detected in early 2020 and which targeted owners of both Android and Windows devices.Systems running the Windows 10 Anniversary Update were shielded from two exploits even before Microsoft had issued patches for them, its researchers have found.The attacks were carried out via two exploit servers delivering different exploit chains via , Google said. Also:  "One server targeted Windows users, the other targeted Android," Project Zero,...

zdnet.com
Catalin Cimpanu
Jan 13
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
A crypto-mining botnet is now stealing Docker and AWS credentials | ZDNet

A crypto-mining botnet is now stealing Docker and AWS credentials | ZDNet

Byfor| January 8, 2021 -- 15:22 GMT (07:22 PST)| Topic:Analysts from security firm Trend Micro said in a report today that they've spotted a malware botnet that collects and steals Docker and AWS credentials.Cyber attacks and malware are one of the biggest threats on the internet. Learn about the different types of malware - and how to avoid falling victim to attacks.Researchers have linked the botnet to a cybercrime operation known as TeamTNT; a group first spotted over the 2020 summer installing cryptocurrency-mining malware on misconfigured container platforms. at the time said that...

zdnet.com
Catalin Cimpanu
Jan 9
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Nissan source code leaked online after Git repo misconfiguration | ZDNet

Nissan source code leaked online after Git repo misconfiguration | ZDNet

Byfor| January 6, 2021 -- 15:40 GMT (07:40 PST)| Topic:The source code of mobile apps and internal tools developed and used by Nissan North America has leaked online after the company misconfigured one of its Git servers.The leak originated from a Git server that was left exposed on the internet with its default username and password combo of admin/admin, , a Swiss-based software engineer, told ZDNet in an interview this week. Kottmann, who learned of the leak from an anonymous source and analyzed the Nissan data on Monday, said the Git repository contained the source code of:The Git...

zdnet.com
Catalin Cimpanu
Jan 8
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Hackers target cryptocurrency users with new ElectroRAT malware | ZDNet

Hackers target cryptocurrency users with new ElectroRAT malware | ZDNet

Byfor| January 5, 2021 -- 15:00 GMT (07:00 PST)| Topic:Security firm Intezer Labs said it discovered a covert year-long malware operation where cybercriminals created fake cryptocurrency apps in order to trick users into installing a new strain of malware on their systems, with the obvious end goal of stealing victims' funds.The campaign was discovered last month in December 2020, but researchers said they believe the group began spreading their malware as early as January 8, 2020.Intezer Labs said the hackers relied on three cryptocurrency-related apps for their scheme.The fake apps were...

zdnet.com
Catalin Cimpanu
Jan 6
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways | ZDNet

Backdoor account discovered in more than 100,000 Zyxel firewalls, VPN gateways | ZDNet

Byfor| January 2, 2021 -- 03:59 GMT (19:59 PST)| Topic:More than 100,000 Zyxel firewalls, VPN gateways, and access point controllers contain a hardcoded admin-level backdoor account that can grant attackers root access to devices via either the SSH interface or the web administration panel.The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing.The backdoor account, discovered by a team of Dutch security researchers from Eye Control, is considered as bad as it gets in terms of...

zdnet.com
Catalin Cimpanu
Jan 3
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
SolarWinds hackers accessed Microsoft source code | ZDNet

SolarWinds hackers accessed Microsoft source code | ZDNet

Byfor| December 31, 2020 -- 20:20 GMT (12:20 PST)| Topic:The hackers behind the SolarWinds supply chain attack managed to escalate access inside Microsoft's internal network and gain access to a small number of internal accounts, which they used to access Microsoft source code repositories, the company said on Thursday.Systems running the Windows 10 Anniversary Update were shielded from two exploits even before Microsoft had issued patches for them, its researchers have found.The OS maker said the hackers did not make any changes to the repositories they accessed because the compromised...

zdnet.com
Catalin Cimpanu
Jan 1
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
FBI: Pranksters are hijacking smart devices to live-stream swatting incidents | ZDNet

FBI: Pranksters are hijacking smart devices to live-stream swatting incidents | ZDNet

Byfor| December 29, 2020 -- 23:12 GMT (15:12 PST)| Topic:The US Federal Bureau of Investigation says pranksters are hijacking weakly-secured smart devices in order to live-stream swatting incidents."Recently, offenders have been using victims' smart devices, including video and audio capable home surveillance devices, to carry out swatting attacks," the FBI said in a  published today.Officials say pranksters are taking over devices on which owners created accounts but reused credentials that previously leaked online during data breaches at other companies.Pranksters then place calls to law...

zdnet.com
Catalin Cimpanu
Dec 31
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Vietnam targeted in complex supply chain attack | ZDNet

Vietnam targeted in complex supply chain attack | ZDNet

Byfor| December 28, 2020 -- 06:00 GMT (22:00 PST)| Topic:A group of mysterious hackers has carried out a clever supply chain attack against Vietnamese private companies and government agencies by inserting malware inside an official government software toolkit.Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.The attack, discovered by security firm ESET and detailed in a report named "," targeted the Vietnam Government Certification Authority (VGCA), the...

zdnet.com
Catalin Cimpanu
Dec 29
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Finland says hackers accessed MPs' emails accounts | ZDNet

Finland says hackers accessed MPs' emails accounts | ZDNet

Byfor| December 28, 2020 -- 18:06 GMT (10:06 PST)| Topic:The Finnish Parliament said on Monday that hackers gained entry to its internal IT system and accessed email accounts for some members of Parliament (MPs).Today's security threats have expanded in scope and seriousness. There can now be millions -- or even billions -- of dollars at risk when information security isn't handled properly.Government officials the attack took place in the fall of 2020 and was discovered this month by the Parliament's IT staff. The matter is currently being investigated by the Finnish Central Criminal...

zdnet.com
Catalin Cimpanu
Dec 29
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Citrix devices are being abused as DDoS attack vectors | ZDNet

Citrix devices are being abused as DDoS attack vectors | ZDNet

Byfor| December 24, 2020 -- 17:34 GMT (09:34 PST)| Topic:Threat actors have discovered a way to bounce and amplify junk web traffic against Citrix ADC networking equipment to launch DDoS attacks.The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing.While details about the attackers are still unknown, victims of these Citrix-based DDoS attacks have mostly included online gaming services, such as Steam and Xbox, sources have told ZDNet earlier today.The first of these attacks...

zdnet.com
Catalin Cimpanu
Dec 26
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Law enforcement take down three bulletproof VPN providers | ZDNet

Law enforcement take down three bulletproof VPN providers | ZDNet

Byfor| December 22, 2020 -- 12:55 GMT (04:55 PST)| Topic:Law enforcement agencies from the US, Germany, France, Switzerland, and the Netherlands have seized this week the web domains and server infrastructure of three VPN services that provided a safe haven for cybercriminals to attack their victims.VPNs aren't essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.The three services were active...

zdnet.com
Catalin Cimpanu
Dec 22
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Firefox to ship 'network partitioning' as a new anti-tracking defense | ZDNet

Firefox to ship 'network partitioning' as a new anti-tracking defense | ZDNet

Byfor| December 19, 2020 -- 08:00 GMT (00:00 PST)| Topic:Firefox 85, scheduled to be released next month, in January 2021, will ship with a feature named Network Partitioning as a new form of anti-tracking protection.VPNs aren't essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set up.The feature is based on "," a new standard currently being developed by the World Wide Web Consortium's Privacy Community Group."Network...

zdnet.com
Catalin Cimpanu
Dec 21
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Apple, Google, Microsoft, and Mozilla ban Kazakhstan's MitM HTTPS certificate | ZDNet

Apple, Google, Microsoft, and Mozilla ban Kazakhstan's MitM HTTPS certificate | ZDNet

Byfor| December 18, 2020 -- 21:04 GMT (13:04 PST)| Topic:Browser makers Apple, Google, Microsoft, and Mozilla, have banned today a root certificate that was being used by the Kazakhstan government to  for residents in the country's capital, the city of Nur-Sultan (formerly Astana).A roundup of the best software and apps for Windows and Mac computers, as well as iOS and Android devices, to keep yourself safe from malware and viruses.The certificate had been in use since December 6, 2020, when Kazakh officials forced local internet service providers to block Nur-Sultan residents from...

zdnet.com
Catalin Cimpanu
Dec 19
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Microsoft confirms it was also breached in recent SolarWinds supply chain hack | ZDNet

Microsoft confirms it was also breached in recent SolarWinds supply chain hack | ZDNet

Byfor| December 17, 2020 -- 23:46 GMT (15:46 PST)| Topic:The state-sponsored hackers who breached US software provider SolarWinds earlier this year pivoted to Microsoft's internal network, and then used Microsoft's own products to further the attacks against other companies, Reuters reported today citing sources familiar with the investigation.The news comes after the US Cybersecurity and Infrastructure Agency (CISA) published  earlier today about the SolarWinds supply chain attack and its impact on government agencies, critical infrastructure entities, and private sector organizations....

zdnet.com
Catalin Cimpanu
Dec 19
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Three million users installed 28 malicious Chrome or Edge extensions | ZDNet

Three million users installed 28 malicious Chrome or Edge extensions | ZDNet

Byfor| December 17, 2020 -- 02:30 GMT (18:30 PST)| Topic:More than three million internet users are believed to have installed 15 Chrome, and 13 Edge extensions that contain malicious code, security firm Avast said today.Our pick of the best Chromebooks for work, school, and home.The 28 extensions contained code that could perform several malicious operations. Avast said it found code to: Also: But despite the presence of code to power all the above malicious features, Avast researchers said they believe the primary objective of this campaign was to hijack user traffic for monetary gains....

zdnet.com
Catalin Cimpanu
Dec 19
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Microsoft, FireEye confirm SolarWinds supply chain attack | ZDNet

Microsoft, FireEye confirm SolarWinds supply chain attack | ZDNet

Byfor| December 14, 2020 -- 04:02 GMT (20:02 PST)| Topic:APT groups aren't all from Russia, China, and North KoreaHackers believed to be operating on behalf of a foreign government have breached software provider SolarWinds and then deployed a malware-laced update for its Orion software to infect the networks of multiple US companies and government networks, .VPNs aren't essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices for best VPNs in 2020 and how to get set...

zdnet.com
Catalin Cimpanu
Dec 15
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Microsoft exposes Adrozek, malware that hijacks Chrome, Edge, and Firefox | ZDNet

Microsoft exposes Adrozek, malware that hijacks Chrome, Edge, and Firefox | ZDNet

Byfor| December 10, 2020 -- 18:37 GMT (10:37 PST)| Topic:Microsoft has raised the alarm today about a new malware strain that infects users' devices and then proceeds to modify browsers and their settings in order to inject ads into search results pages. Named Adrozek, the malware has been active since at least May 2020 and reached its absolute peak in August this year when it controlled more than 30,000 browsers each day. But in a today, the Microsoft 365 Defender Research Team believes the number of infected users is much, much higher. Microsoft researchers said that between May and...

zdnet.com
Catalin Cimpanu
Dec 13
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Amnesia:33 vulnerabilities impact millions of smart and industrial devices | ZDNet

Amnesia:33 vulnerabilities impact millions of smart and industrial devices | ZDNet

Byfor| December 8, 2020 -- 12:47 GMT (04:47 PST)| Topic:Security researchers have disclosed today 33 security flaws in four open-source TCP/IP libraries currently used inside the firmware of products from more than 150 vendors.The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing.Forescout researchers estimate that millions of consumer and industrial-grade devices are currently impacted by the security flaws they discovered, and which they named Amnesia:33. SEE:...

zdnet.com
Catalin Cimpanu
Dec 11
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Hacker opens 2,732 PickPoint package lockers across Moscow | ZDNet

Hacker opens 2,732 PickPoint package lockers across Moscow | ZDNet

Byfor| December 7, 2020 -- 18:21 GMT (10:21 PST)| Topic:A mysterious hacker used a cyber-attack to force-open the doors of 2,732 package delivery lockers across Moscow.The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing.The attack, which took place on Friday afternoon, December 4, targeted the network of PickPoint, a local delivery service that maintains a network of more than 8,000 package lockers across Moscow and Saint Petersburg.Russians can order products online and...

zdnet.com
Catalin Cimpanu
Dec 8
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Kazakhstan government is intercepting HTTPS traffic in its capital | ZDNet

Kazakhstan government is intercepting HTTPS traffic in its capital | ZDNet

Byfor| December 6, 2020 -- 15:46 GMT (07:46 PST)| Topic:Under the guise of a "cybersecurity exercise," the Kazakhstan government is forcing citizens in its capital of Nur-Sultan (formerly Astana) to install a digital certificate on their devices if they want to access foreign internet services.Once installed, the certificate would allow the government to intercept all HTTPS traffic made from users' devices via a technique called .Starting today, December 6, 2020, Kazakh internet service providers (ISPs) such as Beeline, Tele2, and Kcell are redirecting Nur-Sultan-based users to web pages...

zdnet.com
Catalin Cimpanu
Dec 7
Worthy
Share
Save
Give Tip
Review
gold-cheese75%
Ransomware gangs are now cold-calling victims if they restore from backups without paying | ZDNet

Ransomware gangs are now cold-calling victims if they restore from backups without paying | ZDNet

Byfor| December 5, 2020 -- 01:37 GMT (17:37 PST)| Topic:In attempts to put pressure on victims, some ransomware gangs are now cold-calling victims on their phones if they suspect that a hacked company might try to restore from backups and avoid paying ransom demands.If you see any of these malware strains on your enterprise networks, stop everything you're doing and audit all systems."We've seen this trend since at least August-September," Evgueni Erchov, Director of IR & Cyber Threat Intelligence at Arete Incident Response, told ZDNet on Friday.Ransomware groups that have been seen calling...

zdnet.com
Catalin Cimpanu
Dec 6
Worthy
Share
Save
Give Tip
Review
OUTLETS
zdnet.com

zdnet.com

CRITIC
img-contested
N/A
PUBLIC
img-trusted
75%