Blog

FBI warning vishing attacks SIM swap

Warning of vishing attacks to stealing corporate accounts from FBI

With the increase in the statistics, the United States Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) announced by publishing a notice on focusing on Vishing Attack (Voice Phishing) modus operation.  Due to the pandemic situation, many companies drastically moved their operations to the comfort of their employee’s homes. Many companies agreed...
Continue Reading
tiktok flaw exposed user profile phone number data

Disclosed TikTok flaw could have exposed user profile and phone number data

A recently discovered security flaw in TikTok that could potentially enable a hacker to build the application‘s user profile database along with their account associated phone numbers has been disclosed by cybersecurity researchers. The collected data may be utilized in future malicious campaigns and activities.  This flaw can only impact TikTok accounts linked to a phone...
Continue Reading
ministry of defence personal data loss incidents human error

Ministry of Defense in the UK experienced 18% increase in personal data loss incidents

The Ministry of Defense in the UK have an increase of 18% rise on personal data loss incidents for the combined fiscal year 2019 and 2020 based on the official figures after the analysis conducted by Parliament Street. The Defense Department of UK disclosed that there were 546 incidents of reported personal data loss last 2020,...
Continue Reading
Dark Web criminal sites facing exodus Goodbye Joker Stash

Dark Web criminal sites facing exodus – Goodbye Joker Stash

Recently during our Dark Web monitoring search for cool stuff, we encountered a surprising find regarding Joker Stash in one of the notorious criminal forums where carding actors and websites are gathered plotting their next card victims. Victims of Joker Stash Victims are people who own credit and debit card used for transactions either online or...
Continue Reading
hackney council UK London Compromised Data Stolen Data Published Pysa

Data Stolen from Hackney Council in London published online

Hackney Council in the United Kingdom allegedly has their sensitive private data stolen and published online three months after the reported serious ransomware attack that they encountered last October 2020 which have affected their IT systems and network.   The publishing of the stolen data has been claimed by a cyber-crime group known as Pysa/Mespinoza. They had published...
Continue Reading
github repository service malware abuse cybercrime threat actor attack vector

Cybercriminals abused GitHub repository services to host and distribute Malware

Github, an open-source software repositories platform, hosts many software development projects and files, making it the go-to website in terms of documentation and download channel for developers worldwide. These past few years, threat actors and cybercriminals abused and leveraged these accessible repositories to successfully distribute and host some Malware and malicious script components.   In the...
Continue Reading
whatsapp terms of service third party risk assessment privacy policy update

Whatsapp sharing to Third Party: Terms of Service and privacy policy update

Whatsapp the messenger and call app that was merged with Facebook through the acquisition of Facebook wants to mandate its users to accept the updated terms of service and privacy policies until February 8, 2021. In case you don’t want to accept the new terms, a user may opt to delete their accounts. The important changes...
Continue Reading
Voyager Cryptocurrency Broker DNS Threat Intelligence cyberattack

Voyager Cryptocurrency Broker Attacked?

Today’s trading landscape is advanced in the digital world, from trading securities to digital trading currencies that have no backing of value than the real world currencies backed by fiat and banking systems. We can easily conclude that cryptocurrencies are backed by hype too, where we see a rise and fall of digital currencies in value...
Continue Reading
Cyberpunk 2077 crack installer mobile ransomware malware CoderWare BlackKingdom

Ransomware masquerades as the mobile version of Cyberpunk 2077

CoderWare is a recent ransomware in the block that has been victimizing the gamer populace under the guise of a trending game called Cyberpunk 2077 through the Windows and Android platform. Distributing them as game installers, cheats, and cracks are the social tricks used to get users installing the malware. Here is one screenshot where a...
Continue Reading
7 Million Indian Credit Debit Card Data Leak Dark Web

Credit and debit card data leak of 7 million Indian in the Dark Web

The current trend in the dark web highlighted data leak of almost 7 million Indian cardholders’ sensitive information that has been discovered for public view. Based on different cybersecurity organizations’ testimony on the leaked database, they confirmed that the data is as large as 2 GB and includes PAN numbers sold off in the dark web...
Continue Reading
solarwinds orion github passwordl eak CozyBear APT

SolarWinds’ Orion platform Github password leak

The Cybercommunity is currently in chaos as Solarwinds, developer of network management software has confirmed that their sophisticated Orion IT software has been compromised and affected system access was sold off in the underground forum of hackers. The latest report told the 18,000 companies out of 300,000 have been affected by such intrusion. The magnitude of...
Continue Reading
google outage operation aurora DDOS china

Google outage a throw back to the sponsored hackers in China: Operation Aurora

A few days passed; the cyber community again experienced another worldwide Distributed-Denial-of-Service (DDoS) that hits one of the tech giant service providers. With billions of users, Google has been struck by such attacks that led to most of its services – Gmail, Calendar, and Youtube have been inaccessible for a few hours. Based on the initial...
Continue Reading
ryuk ransomware data leak K12 Inc Online School compromised data

Online school giant K12 Inc pays Ryuk Ransomware

Current on the list of the victim of the Ryuk ransomware is the K12 Inc. that caters online educational program from kindergarten to grade 12. With the ongoing pandemic, the company is attending now to over a million students that choose to take online classes that they offered rather than be in the conventional way of...
Continue Reading
hackers cryptominers crypto miners currency OceanLotus APT32 cyber espionage reconnaissance

Nation-State Hackers caught hiding cyber espionage activities behind Crypto Miners

Bismuth adversaries that are often allegedly linked to OceanLotus or APT32 again resurfaced after the cybersecurity experts connected them to recent unravelled intrusion happened to different organization in France and Vietnam. The group has been known since 2012, is used primarily for cyber espionage of a well-known country for intel gathering. With the usual approach, cybersecurity...
Continue Reading
cPanel WHM Software 2FA Authentication Vulnerability

cPanel and WHM Software’s 2-factor authentication vulnerability

Another significant contribution to the cybercommunity has been submitted by an ethical cybersecurity hacker that prevents possible issues that may have compromised many known websites for their vulnerability report. According to the report, the vulnerability has been spotted with the well-known software cPanel and WHM. The company has been in the business since 1997, developing applications...
Continue Reading
credit card stealer malware magecart social media share button

Credit Card Stealer Malware discovered in social media share buttons

Cybersecurity experts that have been monitoring Magecart credit card stealer adversaries have again shared their latest discovery of the current tactics of the umbrella threat actors. On their submitted report, adversaries can conceal their malicious codes on mimicry of share button of popular social media platform from compromised online business websites. Since 2016 where the Magecart...
Continue Reading
Baidu Android mobile apps compromised data

Baidu Android mobile apps caught collecting sensitive user data

The recent scanning of an app of a cybersecurity group had confirmed that the Chinese-based Baidu Android apps were accessible right at your fingertips through Google Playstore can collect sensitive information from its users. According to the report, the application Baidu Maps and Baidu Search box collect information such as Phone Model, its specification, user’s telecom...
Continue Reading
Zerologon Vulnerability APT10 hackers hacking group

APT10 targeting businesses on a global scale using Zerologon Vulnerability

A widespread and highly persistent cyber-attack has been discovered by security researchers. The series of assaults conducted by APT10 hacking group were found to have been leveraging the Zerologon vulnerability of Windows, targeting mostly Japanese firms but has connections to attacks happening in more than 17 territories around the world. No particular industry was targeted, but...
Continue Reading
operation falcon BEC phishing threat actors antiphishing spear-phishing fraud prevention Nigeria

Operation Falcon: BEC Phishing Threat Actors Detained!

Three Nigerian nationals that are ostensibly pointed out as the Threat actors behind a malware distribution for phishing and other scams worldwide lead the joint force of INTERPOL, Nigeria Police Force cybercrime investigation, and Group-IB for their Operation Falcon in Lagos, Nigeria. There were reportedly 50,000 victims that were identified in an enormous Global Scam that...
Continue Reading
Egregor Malware Ransomware antimalware

Egregor: Dynamic Ransomware to keep an eye on

Reportedly been active since mid-September 2020 and a part of the Sekhmet malware family, Egregor is considered one of the most active Ransomware Group this year. This ransomware targets organizations worldwide to steal highly sensitive data, data encryption, and decryption of acquired data to exchange a ransom. Ransomware attacks from Cybercriminals have been around for some...
Continue Reading
1 2 3 4 30