Blog

Healthcare industry

42K Clients’ Data Exposed In New Health First Hacking Incident

Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data was...
Continue Reading
cryptocurrency mining malware

CryptoJacking Malware Uses Victims’ Machines to Mine CryptoCurrency

Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine...
Continue Reading
DarkHotel

DarkHotel: NoKor Hacking Elite Targeting IE Scripting Engine

The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that DarkHotel’s...
Continue Reading
BotNet

New BotNet Army Slowly Spreading Mayhem On The Net

Security specialists have revealed the noxious exercises of another botnet named BCMUPnP_Hunter. It has just subjugated around 100,000 switches and has been unobtrusively becoming in the course of recent months. The botnet is being utilized to convey enormous email crusades and endeavors to interface with webmail administrations.   The botnet’s administrators were spotted utilizing a five-year-old...
Continue Reading
Routers Botnet

100K SoHo Routers Taken Over by A Botnet

A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before the...
Continue Reading
Hospital Data Breach

Huntsville Hospital Data Breach

Huntsville Hospital in Alabama is informing work candidates about a data rupture that may have brought about the bargain of their own information. The data rupture happened in May 2018 yet the doctor’s facility came to think about it just in October 2018.   As indicated by the notice letters conveyed by the healing center, the...
Continue Reading
Banking Malware

Metamorfo Banking Malware Attacking Users In Brazil

Two new Metamorfo malspam battles have been spotted by security specialists. The battles have been pushing keeping money malware variations that are fit for taking certifications and card installment information. These battles are particularly focusing on clients of money related foundations in Brazil. As per the security specialists, who found the new assault incidents, the cybercriminals...
Continue Reading
Google Play

Malicious App Sneaking Around Google Play For A Year

A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group.   At the season of disclosure, the pernicious...
Continue Reading
Online Dating

Hackers Found Selling Online Dating Profiles for a Measly US$153

In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices.   In 2012,...
Continue Reading
Malware Attack on The Pakistani Military

Operation Shaheen: Malware Attack on The Pakistani Military

The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known as...
Continue Reading
crypto exchanges

NoKor Hacked Crypto Exchanges to Fund Regime

As per cybersecurity firm Inksit Group, state-financed programmers in North Korea have been focusing on crypto trades in South Korea to go around different authorizations forced on the routine.   The security firm affirmed the legislature of North Korea of running illegal introductory coin offering (ICO) extends and breaking into substantial crypto trades.   “We found...
Continue Reading
Vishing Scam

Swindling Thru Deception : The New Vishing Scam

Vishing, or voice phishing, is a phishing assault where fraudsters utilize the phone to distort their alliance or specialist with the expectation that unfortunate casualties will uncover qualifications or other individual data for further trade off. Regularly, vishing on-screen characters get the individual data of the person in question, including their telephone number, and start a...
Continue Reading
Anti malware Protection

265 Researchers Take Down 100,000 Malware Distribution Websites

Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded a...
Continue Reading
DNS hijacking attacks

DHS issues security alert about recent DNS hijacking attacks

DHS spreads out four-advance activity plan for researching DNS hacks and securing DNS management accounts.   The US Department of Homeland Security (DHS) has distributed today an ” emergency directive” that contains guidance with respect to an ongoing report detailing a wave of DNS hijacking incidents perpetrated by Iran.   The emergency directive [1, 2] orders...
Continue Reading
Cameras

New Security Script Allows Insecure Cameras to be searched by IP Address

There’s no closure to the security bad dream that is the Internet of Things (IoT). Another apparatus created by a security scientist gives you a chance to seek uncertain reconnaissance cameras by essentially entering a location.   Named Kamerka, the apparatus consolidates information of cameras that are associated with the web with area information to make...
Continue Reading
Radisson Hotel Group Hacked

Radisson Hotel Group Hacked!

The Radisson Hotel Group is informing individuals from its Loyalty Scheme about an information rupture that may have brought about the unknowingly illegal presentation of their sensitive personal information. The illegally exposed data incorporates names, physical locations, email addresses, telephone numbers, Radisson Reward numbers and frequent flyer numbers and information of the individuals/members. The malicious hacking...
Continue Reading
Phishing Modus Using WhatsApp

Phishing Modus Using WhatsApp: An alternative to Email Campaigns

What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners up...
Continue Reading
Phishing

New Phishing Blackmail Campaign

Cyber Security analysts have seen an ongoing switch in strategies by malicious threat actors’ resolved to leading shakedown activities. The essentially terrifying strategy in these phishing activities is to tell the beneficiary the blackmailer has humiliating or harming proof against the objective with an interest to pay a set sum all together for the pernicious on-screen...
Continue Reading
Hackers Hide Crypto-Jackers in Windows Installation Files

Hackers Hide Crypto-Jackers in Windows Installation Files

Crypto-jacking plans are getting more complicated continuously. It shows up programmers are currently masking digital money mining malware and passing it off as authentic Windows establishment bundles.   Analysts say the vindictive programming, all the more normally known as Coinminer, was particularly intended to fly under the radar. What makes the assault especially hard to identify...
Continue Reading
Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

PortSmash is the second processor assault that objectives hyperthreading. TLBleed unveiled in June likewise utilized hyperthreading to decide a private encryption key. The specialists building up that assault ran a program figuring cryptographic marks utilizing the Curve 25519 EdDSA calculation executed in libgcrypt on one coherent center and their assault program on the other sensible center....
Continue Reading
1 2 3 14

Categories