Blog

anti spyware malware

Start-up Spyware Company from Germany Accidentally Exposed Its Data Online

A German-based spyware organization named Wolf Intelligence coincidentally uncovered its very own corporate information, including observation targets’ data, travel paper outputs of its organizer and family, accounts of gatherings and that’s just the beginning. The accidental leak uncovered around 20 GB of the organization’s information, which was left unprotected in a command and control server and...
Continue Reading
Trading Platform and Cryptocurrency Hacks Blamed on North Korea

Trading Platform and Cryptocurrency Hacks Blamed on North Korea

North Korea’s programmers and agents have completely embraced digital currency as a strategy for bypassing global authorizes and raising assets for the Pyongyang administration. Two reports discharged in the previous two weeks by Group-IB and Recorded Future, individually, uncover the profundities to which North Korea has gone to do as such, depending on hacks of digital...
Continue Reading
malware protection

Saudi PetroChem Plant Hacking Blamed On Russians

Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of framework....
Continue Reading
Phony Android Apps Posing as CryptoMiners

Phony Android Apps Posing as CryptoMiners

Several Android applications were discovered acting like mineworkers for unminable digital forms of money, for example, Swell, Cardano, and Tie. The newfound malignant applications were discovered to have been “covering up under the radar” since May 2018. Security specialists have found a few pernicious Android applications hiding in outsider applications that are acting like digital money...
Continue Reading
Malware detection removal

Hackers Are Now Using Your Private Photos As Ransom

Active smartphone users are being warned about a scary new piece of “ransomware” designed to send victims’ private photographs to all the contacts in their address book. The tech security firm McAfee has sounded the alarm over a new type of virus called LeakerLocker, reports The Sun. This creepy ransomware is capable of locking down someone’s...
Continue Reading
Online Love Scam Syndicate Busted

Online Love Scam Syndicate Busted

A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia around...
Continue Reading
TLS Session Resumption

Online Ad Firms Tracking Users via TLS Sessions Resumption

In a research paper distributed toward the beginning of September, four specialists from the University of Hamburg, Germany, have uncovered that web based publicizing firms can mishandle the TLS Session Resumption instrument to track clients as they explore the web. The idea is straightforward. On the off chance that a web based publicizing firm loads promotions...
Continue Reading
Phishing Attack

Phishing Attack Impersonates Law Firm and Microsoft

The most common phishing attacks can often be quite convincing, but some more technologically-aligned users recognize something isn’t right when they see that the login form is unsecured or the SSL certificate doesn’t match the company being impersonated. Nevertheless, there is a new phishing attack that stores their phishing form on Azure Blob Storage, so that...
Continue Reading
The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banker is a banking Trojan that seems to be related to the Zeus Trojan. The Panda Banker, a recently uncovered banking Trojan, is related to one of the most famous and destructive banking Trojans in history. Zeus is quite an old threat that has spawned countless imitators. The Panda Banker is used to target...
Continue Reading
Tumblr security

Tumblr Users’ Account Data Almost Leaked

Tumblr today distributed a report conceding the nearness of a security weakness in its site that could have enabled programmers to take login accreditations and other private data for clients’ records. The influenced data included clients email addresses, secured (hashed and salted) account passwords, self-announced area (a component no longer accessible), beforehand utilized email addresses, last...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber space...
Continue Reading
LoJax: The First Ever UEFI Rootkit Released

LoJax: The First Ever UEFI Rootkit Released

Researchers from ESET who discovered the rootkit say this is the first time researchers successfully detected an actively exposed rootkit that exploits the UEFI or Unified Extensible Firmware Interface specification that defines a software interface between an operating system and platform firmware. By injecting itself this deeply into the computer, the attackers hope to achieve very...
Continue Reading
Apollo Data Breach – 200 Million Records Stolen

Apollo Data Breach – 200 Million Records Stolen

A very large data repository of more than 200 million contact records were stolen from Apollo,  following a data breach incident, a predictive prospecting and sales engagement startup. The leaked information contained the following user information – Names Email Addresses Company Names Media Handles Phone Numbers Job Titles Apollo’s stolen database of records did not contain...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks

Hackers Prefer Tuesdays When Deploying Phishing Attacks

Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which highly...
Continue Reading
GhostDNS

GhostDNS Malware Hacked 100K Routers For Phishing

A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that sent...
Continue Reading
Hackers Selling Frequent Flyer Miles on the Dark Web

Hackers Selling Frequent Flyer Miles on the Dark Web

Dark web vendors have been found selling frequent flyer miles on underground forums. In August, around half a dozen illicit marketplaces on the Dark web were explored by security experts, who discovered how much each stolen frequent flyer reward point is worth. According to security researchers at CompariTech, who discovered the dark web sales of the...
Continue Reading
Facebook Breach

Facebook Breach….. Again?

-But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But wait...
Continue Reading
Facebook Breach

Facebook Breach

The latest Facebook breach has affected at least 90 million users worldwide after hackers exploited a vulnerability that allowed access to profile data. Users were logged out on September 28 as Facebook forcefully ended the session of social media users to secure the accounts affected by the recent breach. Hackers gained the ability to access profiles by...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the chat...
Continue Reading
Dark Web Crimes

European Cooperation To Fight and Stop Dark Web Crimes

“The Dark Web is no longer a hiding place for criminals!” Tweet from Europol, the pan-European law enforcement organization, after a meeting in May establishing a task force against the dark web. This is a very good sign. Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home...
Continue Reading
1 14 15 16 17 18 22