Tag Archive for: tracking

Orbit Chain tracking down hackers after the new-year eve $81M hack


In what appears to be a 2024 bad start, Orbit Chain, a platform specializing in cross-chain transactions, suffered an $81 million hack on Dec-31-2023 at 08:52 PM UTC.

Despite the setback, the platform is taking robust measures to address the situation, involving collaborations with Korean authorities, security agencies, and law enforcement globally. Here are the key details of the hack and the proactive steps taken by Orbit Chain to recover the funds and secure its ecosystem.

Orbit Chain collaborating with Korean National Police and KISA

Orbit Chain swiftly responded to the hack by initiating a collaborative effort with the Korean National Police Agency and KISA. In addition, the platform’s development team has engineered a specialized system for investigation support and cause analysis.

This collaborative approach with Korean authorities aims to enhance the investigation’s comprehensiveness and proactiveness. Discussions are also underway for close cooperation with domestic and foreign law enforcement agencies.

This collaborative effort signals a dedicated pursuit of justice, leveraging the expertise of both technology professionals and law enforcement agencies. By aligning forces with government entities, Orbit Chain seeks to bring the perpetrators to justice and reinforce the security of its cross-chain platform.

On January 2, 2024, the Orbit Chain team updated its community on X stating that it was also trying “to communicate with the attackers of the Orbit Bridge.” They said that they “delivered a second message to them (Jan-01-2024 01:08:35 PM +UTC).”

Besides collaborating with law enforcement agencies, the Orbit Chain team is urging the community and the wider Web3 ecosystem to disseminate information about the incident. This community-driven approach is seen as a strategic move to heighten awareness and potentially aid in the…

Source…

The Computer Security market is likely to witness significant competition tracking over the forecast period, with a projected CAGR of 4.8%.


This “Computer Security Market” study analyses the market and offers thorough insights to help with difficulties and this report consists of 152 pages. The Computer Security market is expected to grow annually by 4.8% (CAGR 2023 – 2030).

Computer Security Market Analytics and Market Coverage

Market analytics and market coverage are essential components of any successful business strategy in the rapidly evolving world of the Computer Security market. In order to stay ahead of the competition and make informed decisions, businesses need to closely monitor market trends and customer behavior, and this is where market analytics and market coverage come into play.

Market analytics involves the collection and analysis of data related to the Computer Security market, including customer demographics, preferences, and purchasing behavior, as well as competitor activities and industry trends. This data is used to identify opportunities for growth, as well as potential threats and challenges that may need to be addressed.

Market coverage, on the other hand, involves the scope and depth of a business’s presence in the Computer Security market, including the range of products and services offered, the geographic reach, and the customer segments targeted. Effective market coverage ensures that a business is able to reach and engage with its target customers in a meaningful way.

Together, market analytics and market coverage provide businesses with a comprehensive understanding of the Computer Security market and help them to make informed decisions about product development, marketing strategies, and overall business operations.

The global Computer Security market size is projected to reach multi million by 2030, in comparision to 2021, at unexpected CAGR during 2023-2030 (Ask for Sample Report).

Get a Sample PDF of the Report – https://www.reliablebusinessinsights.com/enquiry/request-sample/1668094

What is Computer Security?

Computer security plays a pivotal role in today’s digital landscape, safeguarding organizations from a myriad of threats that can potentially disrupt business operations, compromise sensitive data, and tarnish reputations. As a consultant or industry expert, it is essential to…

Source…

Vehere Takes the Lead With Tracking Its First-ever Zero-day Vulnerability and Subsequent Responsible Disclosure


SAN FRANCISCO, May 30, 2023–(BUSINESS WIRE)–Vehere’s research wing, Dawn Treader, has announced its recent discovery of a zero-day vulnerability, marking a significant achievement for the cyber network intelligence organization. This is the first time Vehere has made such a discovery, showcasing the efficiency and capability of the research team. The identification of this vulnerability is a major milestone for the organization, and demonstrates their commitment to staying at the forefront of the ever-evolving cybersecurity landscape.

The vulnerability, identified through fuzzing, was a heap buffer overflow in MagickCore/quantum-import.c and affects ImageMagick versions 7.1.1-6. It allows attackers to exploit a crafted file and trigger an out-of-bound read error, resulting in an application crash and denial-of-service. The vulnerability was responsibly disclosed to ImageMagick, which promptly released a patch addressing the issue by ensuring proper memory allocation. RedHat has released an advisory to warn users about this vulnerability, assigning it a CVSS score of 5.5 and a CVE ID of CVE-2023-2157.

Read Dawn Treader’s exclusive blog post and discover further details about this zero-day vulnerability:
https://vehere.com/threat-severity-high/breaking-down-the-imagemagick-cve-2023-2157-vulnerability-dawn-treaders-findings/

Speaking on this impactful discovery, Vehere’s co-founder Praveen Jaiswal said, “Vehere’s successful identification and ethical disclosure of the vulnerability highlight our commitment to proactively identify and address potential threats. We are extremely proud that we are one of the few Indian companies to identify a zero-day vulnerability, and it serves as a testament to the expertise and dedication of our research team, Dawn Treader.”

Vehere is a revolutionary cybersecurity company that is boldly merging the realms of national security and enterprise security through a single, powerful platform. With a strong global presence and unparalleled expertise in cyber network intelligence, Vehere is radically changing the way organizations and governments protect themselves from cyber threats. Established in 2006, Vehere is a global corporation with offices in San…

Source…

Google settles location tracking lawsuit for only $39.9M • The Register


in brief Google has settled another location tracking lawsuit, yet again being fined a relative pittance.

Washington State Attorney General Bob Ferguson’s office announced the $39.9 million fine last week, along with news that Google will have to implement several state-ordered tracking reforms that clarify what data is being gathered and for what purposes. 

“Today’s resolution holds one of the most powerful corporations accountable for its unethical and unlawful tactics,” Ferguson said in a statement. 

The lawsuit is similar to others filed across the country last year, with attorneys general in Indiana, Texas and Washington, DC joining Washington state in suing Google over claims it used “dark patterns” to trick users into allowing location tracking and data collection, while also making it difficult to opt out. 

In January, Washington DC and Indiana announced a joint settlement with Google that netted the pair $9.5 million and $20 million respectively, which the Washington state AG’s office said it chose not to sign onto in a bid to earn more money for state coffers. 

“Instead of joining a multistate settlement, Ferguson’s office independently filed its own lawsuit and obtained this resolution. The Attorney General’s Office estimates Washington received more than double the amount it would have received under the wider multistate settlement,” the Ferguson’s office said. 

While it’s true that Washington state earned itself considerably more than DC or Indiana, it’s worth noting, as we so often have to do at El Reg, that even a $40m settlement is unlikely to make Alphabet accountants take pause.

In Q1 of this year, Google’s parent company announced [PDF] it had made $15.05 billion in net profit.

Ferguson’s office said it intends to use its Google fine to continue enforcing the Consumer Protection Act. Its enforcement body, the Consumer Protection Division, receives minimal cash from the government and is largely funded by recoveries in cases like this one.

Critical vulnerabilities of the week: KeePass edition

Users of password manager KeePass, beware: it contains a nasty vulnerability that could be used to retrieve all but the first character of a user’s…

Source…