Blog

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019.   “The threat landscape is undoubtedly evolving;...
Continue Reading
DanaBot Banking Trojan Found Targeting European Countries

DanaBot Banking Trojan Found Targeting European Countries

Security specialists from ESET unravel banking trojan named DanaBot being dispersed to European nations by means of spam messages. DanaBot is prominent for its multistage disease chain and secluded design. Earlier research from Trustwave, alongside ESET’s new research, recognizes DanaBot as containing a few segments — generally as powerful connection libraries (DLL) — that perform separate...
Continue Reading
Smoke Loader Malware just got heavier with PROPagate Injection

Smoke Loader Malware just got heavier with PROPagate Injection

A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the user...
Continue Reading
technical support scams

Tech Support Scams Part 2: Freezing Chrome Browser to Panic Victims

We’ve tackled about fake tech support helpers in the past, pretending to fix PCs in exchange for either a fee or a victim’s credit card information. Now a certain exploit that Google Chrome already fixed last February has resurfaced – scammers trying to scare victims by making their browsers unresponsive.   These scammers abuse a particular...
Continue Reading
Popular Browser Extension "Stylish" Discovered Stealing Your Browser Data

Popular Browser Extension “Stylish” Discovered Stealing Your Browser Data

Both Google Chrome and Mozilla Firefox issued a permanent ban against the browser add-on “Stylish”, after Robert Heaton, a software engineer, accidentally found out that it covertly records browser data and sends them to questionable remote servers. Stylish is an add-on that allows users to personalize any website they visit. From changing color scheme to its...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel

Social Engineering: Cyber Love gone Phishing Intel

Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication has...
Continue Reading
The Rotexy Trojan: banker and blocker

The Rotexy Trojan: banker and blocker

On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of this...
Continue Reading
data breach cost

What will a data breach cost you?

With our developing reliance on innovation, huge data breaches are more typical than any time in recent history. Between January 2005 and today, there have been more than 9000 breaks with more than 1.1 billion records uncovered, as per the ID Theft Resource Center. The biggest information breach in history was a hack on 500 million...
Continue Reading
Spyware and Malware protection

Responding to Impersonators ( online fraud )

Falling victim to online fraud Numerous online opportunists rely on deception in order to fulfill their crimes. Those committing online fraud scams are getting considerably more innovative in imitating legitimate businesses to get your information. Phishing emails trying to persuade you to give personal information are the most common. Different impersonators attempt to motivate you to...
Continue Reading
phishing assaults

Holiday shopping and holiday phishing

November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From that...
Continue Reading
Marriott Database Leak

Marriott Database Leak : Where will the data go?

Marriott Database Leak: Where will the data go? Following up with the recent Marriott Database Leak which has been said to be state sponsored by a rival state of USA, the leak is severe and could have contained details that are vital which may have included credit card details. In case the hackers behind the breach...
Continue Reading
Firefox Monitor

Has that website been pwned? Firefox Monitor will tell you

Firefox Monitor, a breach warning site propelled by Mozilla in September, would now be able to convey cautions from inside Firefox program. When the service goes live in the coming weeks, Firefox users running version 62 and later will see a symbol show up in the location bar when they visit a known breach site. Tapping...
Continue Reading
Phishing Attacks

Nine Major Phishing Attacks of 2018 (and How to Spot Them)

The subtle elements of phishing tricks change from year to year. Here, we will talk about phishing email models from a portion of the best phishing plans of 2018. 1. Record Verification Attachments as email bait from legitimate website poses from major company believing that some issue exist with your account.   2. Cloud-Based File Sharing...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability

Vulnerability: Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command

Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too. Below...
Continue Reading
torrent clients

TORRENTING: You could be helping hackers – and you don’t know it

TORRENTING: You could be helping hackers – and you don’t know it Every time you use your torrent client, you take a gamble. It doesn’t matter if it’s the usual chance of running in with some copyright organization; the web traffic using your torrent client is rarely 100% legal. But with technological advancements and research from...
Continue Reading
Rakhni Trojan: A New Breed of Cryptomining

Rakhni Trojan: A New Breed of Cryptomining

Rakhni, an old ransomware dating as far back as the year 2013, recently stepped up its game by adding a new devastating algorithm with its arsenal of attacks. It now decides whether to demand ransomware or secretly profit by installing a miner. How It Works The malware is shared via email attachment, often disguised as financial-related...
Continue Reading
Magecart have gotten smarter with their global card-skimming tactic

Magecart have gotten smarter with their global card-skimming tactic

In the wake of Ticketmaster UK’s website hacking by the infamous Magecart threat group just weeks ago, researchers have discovered how they managed to pull this no-easy-feat off: by hacking their third-party suppliers first. Magecart have already attacked over 800 e-commerce sites to date, and a huge of them can be credited to their employment of...
Continue Reading
Clipboard Hijack

Clipboard Hijack

A new clipboard hijacking malware has been discovered this June, specifically targeting cryptocurrency credentials on matching accounts, mainly destination addresses, most notably for Bitcoin and Etherium users. So far, it has infected an estimated 300,000 computers worldwide, with a huge percentage running on Windows. In case you were wondering how this works, cryptocurrency transfers require users...
Continue Reading
A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Rakhni: A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Ransomware and Cryptocurrency mining attacks have been very frequent this year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature but make...
Continue Reading
Credit Card Breach

Dark Web: Credit Card Breach Dubbed Arabian Nights

Illicit cyber activities has been going on in the dark web. Despite the efforts of authorities and lawful groups, the trend of the black hats and cybercriminals still continues. Lately this month of July a dark web carding store known as Joker’s Stash has been releasing breached cards and dumps information from all around the world...
Continue Reading
1 11 12 13 14 15 23