Blog

marriott hotel data breach compromised data brand protection fraud prevention policy enforcement

Marriott Hotel Data Breach exposes 5.2 Million Guest

Approximately 5.2 million guest information has been leaked in another Marriott Hotel data breach that was announced last Tuesday, 31st March 2020. In an online statement released by the hotel giant last February 2020, they have identified a data breach wherein millions of hotel guests’ information was accessed using security credentials from two of their employees...
Continue Reading
facebook pegasus spyware malware antimalware mobile apps social media

Pegasus Spyware: Facebook allegedly considered to purchase this to spy on iOS users

Facebook is one of the most used Social Media platform worldwide with more than 2.45 Billion monthly active users and counting. The platform also collects personal information on its users once you created an account. This is a known fact and is considered by the US congress as a violation of every individual’s privacy, regardless of...
Continue Reading
coronavirus websites covid19 covid-19 domains fraud prevention malware antimalware threat intelligence phishing antiphishing

Cybercriminals creating massive amount of Coronavirus websites and promotional offers as a trap

The COVID-19 pandemic is currently causing a lot of fear and panic on a global scale. Cyber-criminals, however, saw it as an opportunity to further their fraudulent and malicious activities and take advantage of people during these trying times by creating massive amount of Coronavirus websites and domains. People are staying at home and are more...
Continue Reading
massive data leak israeli voters compromised data risk and compliance brand protection policy enforcement website protection third party risk assessment vendor risk assessment

Massive data leak of Israeli voters’ private information exposed inadvertently

Massive data leak of 6.5 Million Israeli voters’ personal data was exposed on a leak which included names, gender, addresses, and identity card numbers as well as phone numbers and other private information.  Every electoral party list in Israel was given a database containing every Israeli’s personal information for use in their campaign providing that they...
Continue Reading
bird miner malware apple macintosh antimalware digital risk digital risk protection cryptocurrency cryptomining cryptominer

Bird Miner – New cryptomining scheme aimed at Apple Mac users

Stemming from several reports from several security researchers, there’s a new cryptominer called The Bird Miner. It targets Apple Mac systems through an ‘Ableton Live 10’ torrent. The music production software costs several hundred US dollars, so many people are on the look for cracked versions that they can download without paying a dime. However, the...
Continue Reading
iot devices vulnerabiliity p2p remote exploit

P2P weakpoint leaves millions of IoT devices exposed

Security experts discovered two serious vulnerabilities in the iLnkP2P P2P system that ìs developed by Chinese firm Shenzhen Yunni Technology Company, Inc. The iLnkP2P system allows users to remotely connect to their IoT devices using a mobile phone or a PC. Potentially affected IoT devices include cameras and smart doorbells. The iLnkP2P is widely adopted by...
Continue Reading
Google Play Store cryptomalware google play mobile app malware antimalware

Two Crypto-Stealing apps on Google Play Store abused by hackers

Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor app...
Continue Reading
wireless sierra es450 security vulnerability Vulnerabilities forensic analysis

Weakpoints in Sierra Wireless AirLink ES450 discovered

Cyber Security Researchers at CTG disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. Some of the flaws could be exploited to execute arbitrary code, modify passwords, and change system settings. Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices, sensors,...
Continue Reading
rakhni malware ransomware cryptomining spear phishing antimalware antiphishing cryptomalware Ransomware and Cryptocurrency mining spyware

Is your machine good for cryptomining or ransomware: This virus can decide

Ransomware and Cryptocurrency mining attacks have been very frequent since last year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature but...
Continue Reading
cisco industrial network director security vulnerability threat intelligence malware antimalware malware protection

Critical malware allows RCE to Cisco Industrial Network Director

A high-severity malware has been found to Cisco’s enterprise-class Industrial Network Director that allows remote attackers to hijack this industrial network and allows attackers for arbitrary code execution as the root user. The Cisco Industrial Network Director (IND) is designed to help operations teams gain full visibility of network and automation devices in the context of...
Continue Reading
qualcomm chipset chip vulnerability malware

Latest Qualcomm chipset vulnerability flaw allows entry for hackers

Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in a...
Continue Reading
iot devices telnet data leaks compromised data hackers hacker hacking

IoT telnet leaks – Hacker exposes Telnet credentials for more than 500k Devices

A hacker who runs a DDoS Service business from the Dark Web and across the criminal internet forums lately made the front page of the internet discussion through numerous tech-news site as he had published a list of IoT Telnet device credentials amounting to 515,000  devices that he had “cracked.”  The list of exposed credentials was...
Continue Reading
streaming service video on demand critical malware antimalware sql injection

Widely deployed streaming platform turns out to be infected by multiple critical malware

Critical malware used by hackers to hijack televisions are now attacking the popular IPTV middleware platform of more than a thousand of regional and international online media streaming services. This critical  malware execution flaw, if exploited, will grant attackers the power to seize control of the streaming service and content on display and will extract the...
Continue Reading
Fxsmsp hacked hacking hacker trendmicro antivirus av solution anti-virus

Trend Micro is one of the anti-virus firms hacked by Fxsmsp

On a recent report regarding Fxsmsp hacking group that has obtained the source code of these Anti-virus firms. The names of the victims remained undisclosed to the public due to the sensitive nature of the matter and because authorities had been alerted for this incident now, as the victims have released statements that either downplay, contradict...
Continue Reading
instagram phishing attack the nasty list phishing antiphishing social media social engineering

Watch out! Don’t fall for the Instagram ‘Nasty List’ phishing attack

April Fools Day Social Engineering has another way of conning active Instagram users the so called “The Nasty List”. It’s main goal is to harvest victim’s login credentials as basic as username and password to some, but this information may lead to another phishing type of act or worst identify theft.   How it is being...
Continue Reading
nvidia gpu display driver vulnerability hacking hack

American GPU Production Company Patches Display Driver Flaw

American Technology Company NVIDIA, designers of top graphics processing units – issued yet another security update to fix three high and medium severity security issues in the NVIDIA GPU Display Driver that could lead to code execution, denial of service, escalation of privileges, or information disclosure on vulnerable Windows machines. Even though to abuse the patched...
Continue Reading
ministry of health singapore health care system data breach compromised data hacked hacking cyberattack

Singapore Health Care Systems Hacked – Patient Records Compromised

Cyber-criminals have stolen a whole bunch of personal and patient data in a record-breaking hack which contained data between June to July 2018. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals and other healthcare institutions. More than 1 Million patient’s personal records have been...
Continue Reading
mobile phishing antiphishing firefox safari googlechrome chrome

Mobile Browsers Failed To Issue Phishing Alerts for Over a Year

A cyber security research team has identified a vulnerability in the protection of top mobile web browsers. Shockingly, mobile Chrome, Safari, and Firefox failed to show any blacklist warnings between mid-2017 and late 2018 despite the presence of security settings that implied blacklist protection. However, this issue only affects mobile browsers that use Google Safe Browsing...
Continue Reading
labcorp data breach compromised data leak

Massive Data Leak Debunks Data of 7.7 Million LabCorp Customers

A total of 7.7 million customers of the medical testing giant LabCorp exposes their personal and financial data leak to a security breach of the American Medical Collection Agency (AMCA), a third-party billing collection firm.This third-party billing collection firm have been recently breached another competing medical company of the LabCorp, the Quest Diagnostics, with over 12...
Continue Reading
malware masquerades adobe flash antimalware injection hijacking

Newly-discovered malware infecting Macs masquerades as Adobe Flash installer

A malware check has done by the security house of AiroAV when a newly-discovered malware interferes with internet traffic on infested Apple Macs and maliciously inserts Bing results into victim’s Google search results. This malware configures compromised macOS computers to modify Google search results through a local proxy server. This kind of malware is not common...
Continue Reading
1 2 3 22