By

iZOOlogic
mssql malware whiteshadow
Cyber Security Analysts have just discovered and documented the birth and development of a downloader that utilizes Microsoft SQL query to acquire and spread malicious malware packages. Just last August, several cyber security analysts found the new, arranged downloader, known as WhiteShadow, which is being utilized to spread an assortment of malware to vulnerable frameworks....
Continue Reading
bank of valletta hacked cybersecurity cyberattack
Hackers have managed to hack the network of Malta’s Bank of Valletta and have consequently robbed the bank of at least 13 million euros. The Times of Malta had reported, on February 13th, of the Bank of Valletta suffering a hack, following which the hackers moved €13 million into foreign accounts. The report also stated...
Continue Reading
online game databreach thieving mobile app
Smartphone players often rely but get frustrated with the free mobile gaming mechanism, making them wait for a long period of time to advance and unlock some of it’s features. With this in mind, players end up finding ways to progress into the game. Now this is where the hackers come in. Popular mobile games...
Continue Reading
us plate number hacked dataleak data leak darkweb dark web
Perceptics, the firm that bills itself as “the sole provider of stationary LPRs” (license plate readers) at border crossing lanes for privately owned vehicles in the U.S., has been hacked. Tens of thousands of its internal files are now reportedly floating around the dark web for anyone to download. According to several cyber-security research consultants,...
Continue Reading
socialmedia impersonation phishing
The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload...
Continue Reading
googleusercontent malware antimalware
Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malware. It’s as if regular hacking of websites and servers is not enough, these criminals  are now targeting legit hosted websites and its images such as GoogleUserContent and using them as a tool to exploit vulnerabilities while remaining...
Continue Reading
robinhood ransomware malware protection malware attack
Deciding whether you should pay a ransomware or not is a philosophical question until your systems were hit by a ransomware. The city of Baltimore is now on its fifth week battling a file-locking ransomware variant called RobinHood. It infected around 10,000 computers which prevents residents from obtaining building permits and business licenses including buying...
Continue Reading
fbi academy hacked databreach data breach
Authorities were investigating the online posting by hackers on Saturday. The personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy. Cyber Security Researchers counted at least 1,400 unique records of employees of the FBI, Secret Service, Capitol Police, U.S. Park Police and...
Continue Reading
phising email phishing anti phishing phishing solutions
Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over. Phishing kits are packages of ready to deploy fake login pages targeting a wide range of online services, ranging from Gmail and Amazon to Microsoft and PayPal....
Continue Reading
phising email phishing anti phishing phishing solutions databreach data breach
The world-renowned fitness platform – Bodybuilding.com has suffered a data breach in which personal data of registered users has been accessed. The breach was identified in February 2019 and after conducting an investigation it was revealed that it was a result of a phishing attack carried out in July 2018. Although the exact number of...
Continue Reading
1 2 3 43