Blog

georgia county ransomware attack malware us election

Georgia County Voters’ Database hit by Ransomware just weeks before election

A most recent ransomware campaign that staggered a Local Georgia county government allegedly impaired a database to confirm voters’ signatures within the verification of absentee ballots. It is the primary detailed case of a ransomware assault influencing an election-related framework within the 2020 cycle. Government authorities and cybersecurity specialists are particularly concerned that ransomware assaults —...
Continue Reading
donald trump campaign website hacked us election defacement

Donald Trump campaign website hacked

The official campaign website of the United States President Donald Trump was reportedly defaced for almost half an hour on Tuesday, October 27, shortly before 4:00PM PST. A journalist at Jewish News of Northern California, Gabriel Lorenzo Greschler, was reportedly among the first to spot the defacement while researching a climate change article and immediately posted...
Continue Reading
Ubisoft Crytek Egregor Ransomware Malware

New Ransomware Family Egregor attacked Ubisoft and Crytek

Recently, a new ransomware family group called Egregor has reportedly stolen data from Ubisoft and Crytek – two of the largest gaming companies worldwide. These two gaming companies are well known for popular games such as Assassin’s Creed, Far Cry, and Tom Clancy’s video game series. Gaming companies are also one of the main targets of...
Continue Reading
finfisher surveillance spyware germany malware

FinFisher tech firm raided by Authorities over Spyware claims

A Munich-based company, FinFisher, was raided by the German investigating authorities because of alleged illegal exporting of its software outside UE, including Turkey. FinFisher is the firm behind the commercial surveillance spyware dubbed as “FinSpy.” This software is a spying tool that was legitimately intended for Law enforcement investigation and intelligence agencies. Its well-known customers include the...
Continue Reading
lokibot malware cisa advisory antimalware solutions

LokiBot Malware information stealer increase of hostility

Cybersecurity and Infrastructure Security Agency or CISA has recently issued a security advisory notice for US Federal Government organizations and private sectors about increasing LokiBot malware usage cases by threat actors that started in July 2020. EINSTEIN Intrusion Detection System, the in-house security platform CISA uses, has detected continuous malicious activities that can be traced back...
Continue Reading
Operation SideCopy Report Espionage Indian Army indie apt actor

Operation SideCopy Report – Espionage against the Indian Army?

A recent analysis report from an Indian cybersecurity expert exposed an over a year of surveillance by an unknown adversary targeting the Indian government – specifically its military service and notable defense organization. They named the report as – Operation SideCopy. According to the report, the adversary had used a different methodology to pursue its malicious...
Continue Reading
fitbit spyware intrusion social engineering malware mobile app

Fitbit just got fitted with Spyware for social engineering attack

The infamous mobile exercise and fitness app Fitbit was just given a rather “malicious” upgrade. Call it an alarming discovery from a security researcher, who found out that hackers and other threat actors can spike the app with malware, powerful enough to phish out personal and other information from its user. Fitbit advertises their app as...
Continue Reading
chowbus data breach brand abuse brand protection compromised data

Chowbus food delivery startup suffers massive data breach

Chowbus, an Asian food delivery startup owned by Fantuan Group, Inc., just suffered a massive data breach a couple of days ago. They have verified the intrusion and the amount of sensitive data that was compromised during the said breach. The initial assessment of the breach does not show the exact nature of the intrusion. However,...
Continue Reading
wisepay data breach cyber attack compromised data

WisePay online school payment system suffered a breach

WisePay’s website was hacked by the Cybercriminals between October 2-5. It is an online payment service provider that gives parents and guardians access and control to allow them to pay to the school on behalf of the students. Had estimated that there were a total of 300 schools affected, but the firm assumed that only a few...
Continue Reading
mozi botnet iot internet-of-things traffic

Mozi Botnet responsible for IOT Traffic

The latest feast on the cybersecurity realm evolved on the recent report submitted to the community about the Mozi botnet infesting numerous internet-of-things (IoT) devices. After the discovery in 2019, cybersecurity experts observed that this variant of the Mirai botnet has been in circulation for 90% of botnet attacks from October 2019 to June 2020. The...
Continue Reading
College of the Nurses of Ontario netwalker ransomware malware trojan

Netwalker goes after College of the Nurses of Ontario Data

The latest news in the cyber community talks about the College of the Nurses of Ontario (CNO), was added to the piling up roster of victims by cybercriminals Netwalker. Also known as ‘Mailto,’ this cybercriminal has been busy doing its devious act that mostly targets prominent businesses, academic groups, and health institutions. Based on the research,...
Continue Reading
Public Health Wales data leak compromised data infosec information security privacy

Public Health Wales says data of 18,000 COVID patients accidentally published

On August 30, 2020, the Public Health Wales (PHW), a private health organization, has posted accidentally of more than 18,000 patients’ information on their website. The information has been available from 2 PM until the morning of 10 AM before it was taken down. According to the report, the information was viewed publicly by 56 unknown...
Continue Reading
tutanota email distributed denial of service dns ddos

Tutanota encrypted email service suffers DDoS Attack

Series of distributed denial of service (DDoS) was experienced by Tutanota mid of this month. The attack was able to completely halt its use entirely and affects over 2 million of its users. Unknown cyber attackers not only attack the company itself but also spread its malicious activity to the DNS provider of the company, ensuring...
Continue Reading
Shenzhen Zhenhua Data Tech Data Leak compromised data china chinese company

Shenzhen Zhenhua Data Technology allegedly collected Data

Chinese data services company Shenzhen Zhenhua Data Technology is now being questioned with its database and its application called the Overseas Key Information Database or OKIDB. The company is owned by a government-backed military research company – China Electronics Technology Group (CETC). Wherein its CEO is a known supporter of hybrid and psychological warfare, which includes...
Continue Reading
us department of defense vulnerabilities software hardware dod white hat hackers vulnerability assessment

U.S. Department of Defense disclosure on vulnerabilities

A recent disclosure from the U.S. Department of Defense details has been announced to the public. This is about their infrastructure system’s critical and high severity vulnerabilities. The vulnerabilities can allow threat actors to exploit the systems by hijacking a subdomain, remote code execution, or view and capture data and files on a vulnerable machine and...
Continue Reading
pioneer kitten iranian hackers compromised data underground forums dark web data breach

Iranian hacking group Pioneer Kitten sells company data on underground forums

Another speculated Iranian government-backed hacker was seen selling stolen corporate network information on an underground hacking forum. The group was named ‘Pioneer Kitten,’ also dubbed as Fox Kitten or Parisite, which is believed as a contracted hacker for Iran. The adversary is estimated to be working under the radar since 2017, exploiting known vulnerabilities on remote...
Continue Reading
bluetooth vulnerability encryption exploit blurtooth

Bluetooth encryption bug called BlurTooth

An Independent researcher has recently submitted their concluded report about the vulnerability they have unraveled for the current version of the Bluetooth version. The noted version of the application was in ranges of 4.0 to 5.0, in which most modern smart devices have come in the package. The Bluetooth Special Interest Group (SIG) – the group...
Continue Reading
razer customer info leak misconfigured server data leak compromised data fraud prevention

Thousands of Razer customer information leaked on a misconfigured server

On the 18th of August, an Independent Cyber Security Consultant, Volodymyr “Bob” Diachenko has discovered a leaked customer data on a gaming-gear merchant, Razer, that is believed to be a result of server misconfiguration. Diachenko stumbled upon a misconfigured Elasticsearch cluster that exposed Razer’s customer private information for everyone else to see.     There are no...
Continue Reading
ripple20 malware iot device industry internet of things antimalware hardware vulnerabilities

Ripple20 Malware highlights IoT Industry challenges

With the growing statistics and people being reliant on technology and devices connected through the internet, a new dreaded threat has been released for awareness of the public. Consist of 19 zero-day attack vulnerabilities for low-level TCP/IP software library that has been used to millions of devices manufactured, the report was collaboratively named ‘Ripple20’. Exploiting these...
Continue Reading
office 365 phishing attack fake login pages hacking compromised domain

O365 Real-Time response attack on stolen logins

A new variant of scheming for Office 365 credentials has been observed by cybersecurity experts as they stumbled on this method of the adversary. Unlike the usual exfiltration of credentials through the use of specialized spyware/malware, the method used was now based on the real-time response from the victim upon entering their credentials of the domain-controlled...
Continue Reading
1 2 3 27