Blog

crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The investigation...
Continue Reading
twitter hack attack cybercrime update social engineering inside job

Twitter Hack: Fallout investigators on trail of cyber criminals

One of the prominent social media has not been excluded from the list of attacks of malicious actors. With the news spread in the cybercommunity, Twitter has been jeopardized for high profiled personalities as perpetrators were able to gain access to it. In the report, politicians, celebrities, and businessman accounts have been compromised, leading to cryptocurrency...
Continue Reading
cybercrimes cyber attack canada canadian population fraud prevention

Half Of the Canadian Population Were Preys of Cybercrimes

Recent statistics that were presented by the cybersecurity researchers of Canada, under one of its cybercrime body – Cybersecure Policy Exchange (CPX) shows that 57% has been victimized by different online fraud. This contrasts with other researchers that were reported in 2017, wherein they gauge that only 36% has become a victim of cybercrimes and malicious...
Continue Reading
leaked hacking video iranian hackers hacking ITG18 Charming Kitten Phosphorous APT35

Iranian Hackers leaked their training videos

Prominently known since 2014, the government-backed Iranian hackers, accidentally exposed their stealth method hacking process due to a glitch on the security imposed on its cloud virtual private storage. Known as  ITG18 (also called Charming Kitten, Phosphorous, or APT35), they specialize in gathering intelligence and espionage targeting the United States and Middle Eastern high ranking officials...
Continue Reading
wastedlocker ransomware malware antimalware cyber attack trojan

Ransomware: WastedLocker Version X

Cybersecurity experts recently unveiled new ransomware that has been victimizing specific large business organizations demanding ransom from USD 500K to USD 10 Million. Operated by threat actor group Evil Corp Gang , the new and lethal program was named ‘WastedLocker.’ The attack was usually circumventing mainly in the United States, with a few in the European...
Continue Reading
amazon phishing vishing attacks

Amazon credential Phishing and Vishing attacks are on the move

Amazon is an eCommerce company that currently has ‎US$14.541 billion in operating income in 2019. This eCommerce giant has been one of the go-to shopping platforms of people now more than ever because of lockdown implementation caused by COVID-19. As many are ordering their stuff online as it’s safer than leaving the house excessively, Amazon has...
Continue Reading
zoom vulnerability vanity URL flaw exploit

Vanity URL: Newly discovered Zoom vulnerability

A cybersecurity researcher has recently discovered a flaw in Zoom conferencing software. The newly discovered Zoom vulnerability is relatively minor but it is easy to exploit the flaw. This flaw can allow mimicking an Organization and would trick employees divulging their personal and confidential information by using Social Engineering. As we all know, Zoom’s popularity has...
Continue Reading
cyber attack exchange server vulnerability security policy enforcement email social engineering

Cyber attack on vulnerable Exchange Server

CVE-2020-0688 | Microsoft Exchange Memory Corruption Vulnerability A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time. Knowledge of the validation key allows an authenticated user with a mailbox to pass arbitrary objects to be deserialized by the web application, which runs as SYSTEM....
Continue Reading
chingari mobile app hackable authentication

Chingari App: Easily Hackable

With people succumbed to social media to be on the trend and in the know of the latest news and updates, Chinese App Tiktok was on the top list that has been banned in India’s circulation. This app was a global trend and boomed on people as this platform can share short videos and information to...
Continue Reading
twitter high profile account hijacked cryptocurrency scam social engineering

High Profile Twitter accounts hijacked to promote Cryptocurrency Scam

Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common cryptocurrency...
Continue Reading
government app threat citizens infosec data privacy

Government sanction Apps that pose a threat to Citizens

There seems to be a race going on every government to come up with a contact tracing app, and another part of the scene are threat actors who could also come up with a copycat app. It is undoubtedly a copycat that may exist on every legitimate application when somehow someone tries to exploit the apps....
Continue Reading
treck inc ripple20 vulnerability software vulnerabilities assessment iot internet of things

Treck Inc put Internet of Things in peril

You probably never heard of IoT or perhaps came across the term, and you might have never really known what it was. The  Internet of Things, aka IoT, is connecting any machine capable of connecting to the internet. Research from different experts shows that by 2021 there will be over 26 billion connected devices globally.  ...
Continue Reading
wikileaks founder indictment industry news

WikiLeaks founder Indictment

Founder and Director of the well known non-profit organization WikiLeaks – Julian Assange (Age 48 from Australia) is facing 18 counts of the indictment in the presence of the US Department of Justice. The charges were for curating as considered the biggest conspiracy of highly classified intel in the United States of America’s history. The case...
Continue Reading
botnet hacker operator malware satori iot

Justice granted as botnet hacker gets jailed – Crimes do not pay

Cybercrime Botnet Hacker Busted With collaborative effort from the private sectors and the Federal Bureau of Investigation (FBI) of the United States of America, perpetrators behind ‘Satori’ IoT botnet has been sentenced by the court to serve 13 months in federal prison. As written on the court documents, the verdict was served to Kenneth Currin Schuchman...
Continue Reading
aerospace military hacking attack social engineering linkedin fraud prevention

Aerospace and Military intercepted using LinkedIn profile

Cybersecurity researchers from a renowned Software Security company recently submitted their recent paper about the unfortunate event in the aerospace and military logistics deployed in Europe and the Middle East region. The report confirmed that this infiltration targeted high profiled employees in LinkedIn from the mentioned key field and had been taken place between September to...
Continue Reading
phishing emails bank of america antiphishing phishing solutions

Bank of America: Phishing emails bypassed the mail security

Experts still consider phishing as the most commonly used attack on the organization, and it tops all online surveys. Out of the 2,109 organizations recently hit by a cyberattack, over half were victims of phishing. Phishing is still the most widespread cyberattack in all countries except for Colombia, where it was the second most common threat....
Continue Reading
retirement system san francisco data breach

Data Breach of a retirement system in San Francisco

Cybercrime experts recently reported that the breach of the San Francisco Employees Retirement System that leaked out sensitive information of registered active and retired employees for their retirement program. An in-depth report concluded that the leakage came through after unauthorized access was gained on the test environment created by the contracted developer for their website. It...
Continue Reading
coinsquare data theft

Inside Job – Coinsquare Data Theft Facilitated by Former Employee

Canada’s leading cryptocurrency platform hacked? Coinsquare is widely considered as Canada’s foremost platform for cryptocurrency exchange. The organization is one of the world’s leading cryptocurrency company for most known digital currencies. As a regulated exchange body of Canada’s FINTRAC (Financial Transactions and Reports Analysis Centre), Coinsquare was able to obtain a reliable and exclusive business partnership...
Continue Reading
cpa canada data breach cyber attack

CPA Canada Falls Victim to Cyber Attack

Chartered Professional Accountants of Canada, or known as CPA Canada is a national organization, the largest of its kind in the world, governing and representing the accounting profession in Canada and around the world. They issue guidance, leadership, quality assurance standards for businesses, audits, and financial assurance all across the country and their clients all over...
Continue Reading
u.s. military contractor maze ransomware group

U.S. Military Contractor for missiles hit by Ransomware

The United States Military, according to several sources, currently maintains a unique variation of long-range missiles on its arsenal. These are not just your standard long-range artillery that causes minor property damages, and we’re talking about ICBMs or Intercontinental Ballistic Missiles. These bad boys are designed for LTA or land-to-air deployment, intended to hit any particular...
Continue Reading
1 2 3 25