Blog

Apollo Data Breach – 200 Million Records Stolen

Apollo Data Breach – 200 Million Records Stolen

A very large data repository of more than 200 million contact records were stolen from Apollo,  following a data breach incident, a predictive prospecting and sales engagement startup. The leaked information contained the following user information – Names Email Addresses Company Names Media Handles Phone Numbers Job Titles Apollo’s stolen database of records did not contain...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks

Hackers Prefer Tuesdays When Deploying Phishing Attacks

Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which highly...
Continue Reading
GhostDNS

GhostDNS Malware Hacked 100K Routers For Phishing

A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that sent...
Continue Reading
Hackers Selling Frequent Flyer Miles on the Dark Web

Hackers Selling Frequent Flyer Miles on the Dark Web

Dark web vendors have been found selling frequent flyer miles on underground forums. In August, around half a dozen illicit marketplaces on the Dark web were explored by security experts, who discovered how much each stolen frequent flyer reward point is worth. According to security researchers at CompariTech, who discovered the dark web sales of the...
Continue Reading
Facebook Breach

Facebook Breach….. Again?

-But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But wait...
Continue Reading
Facebook Breach

Facebook Breach

The latest Facebook breach has affected at least 90 million users worldwide after hackers exploited a vulnerability that allowed access to profile data. Users were logged out on September 28 as Facebook forcefully ended the session of social media users to secure the accounts affected by the recent breach. Hackers gained the ability to access profiles by...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the chat...
Continue Reading
Dark Web Crimes

European Cooperation To Fight and Stop Dark Web Crimes

“The Dark Web is no longer a hiding place for criminals!” Tweet from Europol, the pan-European law enforcement organization, after a meeting in May establishing a task force against the dark web. This is a very good sign. Europe is ready to get serious about fighting crime schemes hatched on the dark web, the infamous home...
Continue Reading
Cyber Security Experts Are Calling For Sharing And Classification of Resources on The Dark Web

Cyber Security Experts Are Calling For Sharing And Classification of Resources on The Dark Web

Terbium Labs, a Dark Web Intelligence Company has called for an industry-wide, standardized framework for evaluating and describing goods and services for sale on underground forums, after complaining that most research is inconsistent and misleading. They have gathered and analyzed 22 reports from 18 different sources dating back to 2013 to better understand how security vendors...
Continue Reading

Drupalgeddon V2 Update: Backdoors by utilizing Shellbot Malware

The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a bot...
Continue Reading
Hackers Stole $15Million from Cosmos Bank

Hackers Stole $13.4 million from Cosmos Bank

Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation revealed...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrollment Program.   Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
tech support scam

Mouse Cursor Hijacker: The New Scam

Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to be...
Continue Reading
Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite Hacked – Leaked Info Sold on Dark Web

Fortnite hack leads to children’s personal data being shared on dark web as scammers rack up huge in-play charges. For a measly £2.05 each, user logins and passwords of gamers are currently being sold on the lucrative online black market through this Fortnite hack. Fortnite is a game of survival wherein players can create a superhero...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection. The Add-On was developed by a German firm named Creative Software Solutions, it has over 220,000 installs...
Continue Reading
Phishing using the ZeroFont Technique

Cyber Attack: Phishing using the ZeroFont Technique

Cyber criminals area at it again. And this time, they are after familiar territory – Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in this digital age, almost everyone...
Continue Reading
Cold Boot Attacks - A Chilling Reality

Cold Boot Attacks: A Chilling Reality

A couple of cybersecurity researchers have developed a method that can bypass mitigations for concentrated attacks on laptops. A physical attacker can compromise a laptop that’s in sleep mode, potentially acquiring sensitive information such as passwords, encryption keys and other personal data. The complications are immeasurable – the attack will work on any make and brand...
Continue Reading
URL Spoofing on Safari Browsers

URL Spoofing on Safari Browsers

An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched,...
Continue Reading
Magecart

More victims for Magecart Hack Group

Just days after the British Airways breach which exposed almost 400,000 payment card information, the hack group was also recognized as behind the hacking of two additional victims this week – Feedify and Groopdealz. The hack of Feedify was disclosed after a Twitter user named “Placebo” posted Tuesday that Magecart was seen attacking the Feedify platform....
Continue Reading
E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-MAIL: The Single Heaviest Security Challenge for Companies Today

E-Mail, or electronic mail is the single most effective and efficient commonplace method of communicating with someone in the business world today. Even as other methods of digital communication have come and gone, over its 40-year history, email still remains the backbone of business communications with almost 4 Billion users worldwide collectively sending 300 billion electronic...
Continue Reading
1 16 17 18 19 20 23