By

iZOOlogic
cryptojacking malware
Analysis of new malware samples used by the Rocke group for cryptojacking reveals code that uninstalls from Linux servers multiple cloud security and monitoring products developed by Tencent Cloud and Alibaba Cloud.   Rocke’s goal is to compromise Linux machines and use them to mine for Monero cryptocurrency. They exploit several vulnerabilities in Apache Struts...
Continue Reading
phishing attack android mobile hacking malware mobile app
Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server.  ...
Continue Reading
samsung s10 issue fingerprint scan
South Korean Tech Giant – Samsung – is currently facing both a controversial and embarrassing issue with one of their latest flagship mobile device, the Samsung S10. They are now scrambling to release the latest software update in order to fix this problem with the S10’s in-display fingerprint sensor technology.   Currently, just about anyone...
Continue Reading
instagram records social media compromised data
Huge amount of Instagram records has been exposed by Anurag sen a security researcher. Instagram was so far clueless on how this unsecured profile ended up online. The Instagram data included user bios, profile pictures, followers’ numbers and location. This information is viewable online. According to online tech publishing firm, which incidentally, broke the story....
Continue Reading
game of thrones got phishing malware antiphishing antimalware
The popular series’ – Game of Thrones’ – fans have been eagerly awaiting the weekly episodes of this wildly popular series in its final season. With this anticipation and enthusiasm for the show, comes an opportunity for phishing scam and hacker attacks.   This week, security researchers from well-known firms cited Game of Thrones as...
Continue Reading
vpn malware
Several enterprise VPN apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division. An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public disclosure by CERT/CC,...
Continue Reading
robinhood ransomeware malware antimalware
The world of cybersecurity is full of surprises. From using and downloading your Game of Thrones torrents to exploiting popular porn websites — notorious cybercriminals keep coming up with new ways to cause you harm. In a related development, a ransomware called RobinHood is spreading havoc in North Carolina, where the ransomware has crippled most...
Continue Reading
bank payroll phishing
Scams targeting tax professionals in phishing scam emails involving payroll direct deposit and wire transfer have been on the increase, warns the Internal Revenue Service. The IRS and its Security Summit partners report that these business email compromise/business email spoofing (BEC/BES) tactics generally target all types of industries and employers, but recently the service has...
Continue Reading
mssql malware whiteshadow
Cyber Security Analysts have just discovered and documented the birth and development of a downloader that utilizes Microsoft SQL query to acquire and spread malicious malware packages. Just last August, several cyber security analysts found the new, arranged downloader, known as WhiteShadow, which is being utilized to spread an assortment of malware to vulnerable frameworks....
Continue Reading
bank of valletta hacked cybersecurity cyberattack
Hackers have managed to hack the network of Malta’s Bank of Valletta and have consequently robbed the bank of at least 13 million euros. The Times of Malta had reported, on February 13th, of the Bank of Valletta suffering a hack, following which the hackers moved €13 million into foreign accounts. The report also stated...
Continue Reading
1 2 3 4 45