Blog

Redtail Anti-malware Anti-fraud Hackers Data Breach

RedTail Technologies Endures Massive Data Breach

Redtail Technology is the latest company left scrambling after inadvertently leaving client data exposed and vulnerable to outside parties. The advisor-focused customer relationship management (CRM) provider confirmed that a data exposure on March 4, left sensitive customer data in an unsecured environment, affecting “less than 1% of Redtail clients,” according to a statement provided by CEO...
Continue Reading
Hacking, Malware, Breach, Hackers

Targeted Cyber Attack Using BotNets

Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard to detect bruteforcing mechanism. A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise. It highlights...
Continue Reading

Tensions Rise as Iranian Hackers Commence with New US-targeted Movement

Top cyber security researchers have taken notice of a new campaign of focused phishing emails being transmitted to US targets from a hacker group known by the names APT33, Magnallium, or Refined Kitten, and broadly believed to be working within the service of the Iranian authorities. Division of Power and US nationwide labs are two of...
Continue Reading
Data Breach

US Health Technology Provider Suffers Data Breach

A US-based medical software provider called – Meditab Software Inc.  and it’s, Public relations-based affiliate, MedPharm Services – have suffered a massive data breach that exposed protected health information. Meditab Software and MedPharm Services were both founded by Kalpesh Patel. After being alerted to the breach, the fax server was taken offline, and an investigation was...
Continue Reading
twitter ceo, jack dorsey hacked

Jack Got Hijacked – Twitter CEO’s Account Hacked

It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb threat....
Continue Reading

US Real-Estate Firm Suffers Huge Data Exposé

More than 800 Million real-estate documents – dating as far back as 2003 – owned by First American Financial, just got exposed in a recent data leak. The company, one of the largest real estate title insurance firms in the US, has already fixed the vulnerability as of Friday afternoon after the security researcher notified it...
Continue Reading
cyber security

British Airways faces £183 million fine over a massive breach of customer data

British Airways (BA), the largest airline in the United Kingdom founded in 1974, faced a massive breach of customer data back in 2018. Customers who booked flights using the BA website or application were redirected to a malicious website controlled by hackers. Information that was taken included names, addresses, usernames, passwords, credit card details, and other...
Continue Reading
Triada malware

Triada malware infecting pre-installed android phones

Lots of smartphone manufacturers are tricked into installing a malware trojan known as Triada, who masquerades as a software vendor believing this will help them add features to the standard Android OS. This Triada malware is designed to put spam and ads on their device. The creators of Triada then collects revenue from the ads displayed...
Continue Reading
Mobile Phishing Campaign

South Korea Falls Victim to Mobile Phishing Campaign

The campaign, labeled “Soula”, collects information via a spoofed login screen of one of the country’s leading search engines that pops up over the original webpage.   It sends the logged credentials to the attackers’ server even without accurate data confirmation, leading researchers to think that the cybercriminals are at research and information-gathering stage.   An...
Continue Reading
Anti-malware tools

SQL Database Weakpoint – A Hacker’s EntryPoint

Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals.   Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications.   SQLite is a...
Continue Reading
Mac Malware Utilized by Hacking Group APT32 to Attack Servers

Mac Malware Utilized by Hacking Group APT32 to Attack Servers

A newly identified MacOS backdoor detected by AV companies as OSX_OCEANLOTUS.D that is perceived as the latest version of a threat used by OceanLotus (a.k.a. APT 32, APT-C-00, SeaLotus, and Cobalt Kitty).   OceanLotus was responsible for launching targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms. The attackers behind OSX_OCEANLOTUS.D...
Continue Reading
New MacOS Phishing Scheme Found

New MacOS Phishing Scheme Found

The 2017 version of OSX.Dok used a fake Preview icon to disguise an application bundle. The malware apparently targeted mostly European Mac users and was spread via an email phishing campaign that attempted to convince the user there was some problem with their tax returns.   A similar trick is used in the new version, only...
Continue Reading
Info-stealing malware targeting android phone users | Malware Trojan

Info-stealing malware exploits bouncing golf campaign targeting android phone users

Security Researchers recently discovered a new malware trojan called GolfSpythat targets android phone users in the Middle East and was designed to steal personal information and potentially take control over mobile devices.The malware’s cyberespionage campaign was named “Bouncing Golf”based on the malware’s code in the package named “golf.”This info-stealing malware is known for its wide range...
Continue Reading
Data breach

Unprotected Evite website containing customers’ data exposed in a data leak

A social planning and e-invitations service company named Evite detected a security breach when anunauthorized party acquired an inactive data storage file associated with the firm’s user accounts last April 15, 2019. This storage file contains customer’s information which includes names, usernames, email addresses, passwords, dates of birth, phone numbers, and mailing addresses.   Among the...
Continue Reading

Massive data leaks hit Oregon State University exposing hundreds of students’ information

Recently, a successful cyberattack hit Oregon State University compromising personal information of hundreds of students including their family members. The university announced that a total of 636 students and family’s records containing personally identifiable information were compromised due to a cyberattack that occurred in early May 2019.   Individuals outside the university hacked an OSU employee’s...
Continue Reading
Malware and Adware Attacks Using WP Plugins

Malware and Adware Attacks Using WP Plugins

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken to...
Continue Reading

Infamous TA505 Hackers Attacked US Companies – Again

Cybercriminals behind the notorious Dridex and Locky ransomware have a new target in their sights – large retail, restaurant and grocery chains located in the US.   Researchers are warning the well-known financial criminal group TA505 is behind a new wave of email campaigns distributing personalized malware-laced attachments, a technique not previously associated with the threat...
Continue Reading

More than 1Million RDP Servers Attacked by BotNet-Wielding Hackers

Hackers have deployed a botnet that’s actively targeting systems running a remote desktop protocol (RDP) connection using a hard-to-detect brute-forcing mechanism.   A security researcher has discovered that more than 1.5 million RDP endpoints have so far been compromised by a botnet dubbed GoldBrute and that this figure is only expected to rise.   It highlights...
Continue Reading

MimiKatz Ransomware – Specially designed for Hacking

In this day and age, digital aggressors are consistently gaining ground in their hacking apparatuses and systems so as to accomplish a greater vindictive plan. Be that as it may, this does not mean they are for saking the essential instruments, methods, and systems when leading a digital assault.   Indeed, a large portion of the...
Continue Reading
cybersecurity

CERT and US Homeland Security Investigates Bugged VPNs

Several enterprise virtual private networking apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division.   An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public disclosure...
Continue Reading
1 2 3 18

Categories