By

iZOOlogic
Domain Factory hacker
One of the largest hosting companies in Germany, DomainFactory, has been penetrated by hackers. The hosting company, which is owned by GoDaddy since 2016, reported that the data breach happened around late April 2019, but the company found out about the incident just last week, May 23rd, after the alleged Hacker began sharing bits of...
Continue Reading
hacking
Businessman/ spy / hacker? It marks the first time that the FBI has issued an arrest warrant for a foreigner charged with an act of cyber espionage via a network attack that has until now been attributed exclusively to state actors like the PLA (Chinese People’s Liberation Army).Su Bin, 51, a Chinese national who also...
Continue Reading
UC Browser Apps
Threat summary This affect latest UC Browser version 12.11.2.1184 and UC Browser Mini version 12.10.1.1192. The vulnerability resides in the way User Interface on both browsers handles a special built-in feature that was otherwise designed to improve users Google search experience.The vulnerability, which has no CVE identifier as its discovered so recently, Browser could allow...
Continue Reading
Mobile Apps
It’s not just dating and health apps that might be violating your privacy when they send data to Facebook.   A Privacy International study has determined that “at least” 20 out of 34 popular Mobile Android apps are transmitting sensitive information to Facebook without asking permission, including Kayak, MyFitnessPal, Skyscanner and TripAdvisor.   This typically...
Continue Reading
Phishing Attack
A recently discovered phishing campaign has been targeting financial sector employees in the U.S. and UK with remote access trojan payloads stored on a Google Cloud Storage domain.   Researchers that the campaign seeks to infect PCs and other endpoints by tricking victims into clicking on malicious links that lead to .zip or .gz archive...
Continue Reading
Huawei devices
The US Government’s fraud management efforts appear to have made the world go hysterical as it had ordered Alphabet’s Google to revoke the license of Android and Google proprietary apps from Huawei. In a sudden turn of events the Department of Commerce has given Huawei a temporary general license to maintain its current products.The general...
Continue Reading
Cipher Stunting
Threat Summary There has never come a time when TLS signature become focal point of target by malicous actors. Since cipher stunting is fairly new in the threat landscape, and now prevailing as a new vector to be exploited. This approach is found to be the latest evasive technique and more predominately used that reached...
Continue Reading
WordPress Plugin Vulnerability
Beware of a new, unpatched vulnerability that has been made public and could allow attackers to compromise your online store. To be clear, the reported unpatched vulnerability doesn’t reside in the WordPress core or WooCommerce plugin itself.   The vulnerability exists in a plugin, called WooCommerce Checkout Manager, that extends the functionality of WooCommerce by...
Continue Reading
best virus malware protection
Malware Summary Qakbot or Qbot also known as bank malware has been in the threat landscape since 2008 similar to Rubber Ducky, Mimikatz, and is considered one of the most effective malware families of the past decade, in part because its source code is available to cybercriminals, so it can be easily modified and extended....
Continue Reading
WI-FI Security
Wireless Fidelity We are all connected with it and used it in on daily basis  using computers, smart phones, iPads, game consoles, even our home appliances and other devices to communicate over high-frequency radio signal or wireless signal, however we have less information on how it originally go about, how secure it is and who...
Continue Reading
1 2 3 4 39