By

iZOOlogic
Mac Malware Utilized by Hacking Group APT32 to Attack Servers
A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).   OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind...
Continue Reading
New MacOS Phishing Scheme Found
The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns.   A similar trick is used in the new version,...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan
Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide...
Continue Reading
Data breach
A social planning and e-invitations service company named Evite detected a security breach when anunauthorized party acquired an inactive data storage file associated with the firm’s user accounts last April 15, 2019. This storage file contains customer’s information which includes names, usernames, email addresses, passwords, dates of birth, phone numbers, and mailing addresses.   Among...
Continue Reading
Recently, a successful cyberattack hit Oregon State University compromising personal information of hundreds of students including their family members. The university announced that a total of 636 students and family’s records containing personally identifiable information were compromised due to a cyberattack that occurred in early May 2019.   Individuals outside the university hacked an OSU...
Continue Reading
Malware and Adware Attacks Using WP Plugins
With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken...
Continue Reading
Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US.   Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the...
Continue Reading
Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism.   A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise.   It...
Continue Reading
In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of...
Continue Reading
cybersecurity
Several enterprise virtual private networking apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division.   An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public...
Continue Reading
1 2 3 4 42

Categories