A Twitter profile linked to suspected Russian hackers, which last year pushed out stolen health documents of Olympic athletes, resurfaced on Wednesday - leaking files.
The group has been using this attack technique in campaigns since at least July 2016, ESET researchers said.
The attacks are thought to have begun after a security researcher published a proof-of-concept exploit in December.
The Meltdown and Spectre flaws affect nearly every modern processor and impact a range of devices such as computers, smartphones, tablets and servers.
"A person cannot live in those conditions for ever," Ecuador's foreign minister Maria Fernanda Espinosa said.
Although Twitter is no stranger to phishing scams, the latest incident does highlight serious flaws in Twitter's ad approval system.
Researcher Arnau Code said he has already successfully tested the CoffeeMiner attack in real-life scenarios including in cafes.
"It's not clear if we're looking at an early test of an attack, or part of a 'legitimate' mining operation," researchers said.
Hackers targeting February's Winter Olympics in Pyeongchang, using a booby-trapped Microsoft Word document to infect computers.
Florida's AHCA said one of its employees fell victim to a "malicious phishing email" late last year.
Trump and the White House have fiercely denounced the book by a "totally discredited" author as "fake" and full of lies.
"'LightsOut reminds us once again that users need to be wary of downloading from app stores," researchers said.
The report has already been dismissed as "fake news" by Indian Prime Minister Narendra Modi's Bharatiya Janata Party (BJP).
Since the source code for version 2.0.8.9 of the ZeuS trojan was leaked in 2011, other threat actors have taken inspiration from the malicious code.
Tech giant made the admission in a blog post, but said patches had been issued and there were no known vulnerabilities.
The stock sale took place five months after Intel was alerted by security researchers about the critical chip vulnerabilities.
Security experts speak to IBTimes UK about the threat posed by various smart toys, from dolls to watches
Android users should be on alert for a new malware variant posing as ride hailing app Uber in an attempt to steal passwords, security researchers warn.
Users are even asked to sign and agree to an end-user licence agreement (EULA) that describes the information to be gathered and used by the app.
The flaws potentially affect nearly all processors built in the last two decades and impact almost any device that uses the hardware.
"Please be assured that we will make every effort to ensure this does not happen again," the DHS said in a statement.
The vulnerable GPS services are exposing location data, phone numbers, device model, IMEI numbers, photos and more.
While most apps seemed to be available on Google Play Store some were also spotted on Apple's App Store as well.
"When an IoT exploit becomes freely available, it hardly takes much time for threat actors to up their arsenal," NewSky Security warned.
The zero-day vulnerability is a local privilege escalation (LPE) flaw and can only be exploited when the attacker has local access to the targeted device.
The scam involved people being told that they had been named benefactors by an African royal and had to share their personal information to get the money.
The vulnerability shows how seemingly insignificant side-channels can exploited to infiltrate even strong smartphone security measures.
Users of the popular Chrome extension Archive Poster reported observing the change around the beginning of December.
Forever 21 has over 815 stores in 57 countries including the US, UK, Australia, China, India, Germany, Japan and Latin America.
UK-based Bitcoin exchange Exmo, took to Twitter to inform its users about having suffered a DDoS attack just days after one of its employees was kidnapped.