Blog

Remote Trojans

Nigerian Fraudsters Prefer Remote Trojans For Scamming

Nigerian business email compromise scams are growing more dangerous and sophisticated as cybercriminals add new tools and techniques to their arsenal such as remote access trojans (RATs) and advanced information stealers. But even beyond soaring cybercriminal incidents, criminals are becoming less of a pesky threat, such as Nigerian Prince 419-style email scams, and more dangerous. Unit...
Continue Reading
cryptojacking malware

CryptoJacking Malware Functions Under The Radar

Analysis of new malware samples used by the Rocke group for cryptojacking reveals code that uninstalls from Linux servers multiple cloud security and monitoring products developed by Tencent Cloud and Alibaba Cloud.   Rocke’s goal is to compromise Linux machines and use them to mine for Monero cryptocurrency. They exploit several vulnerabilities in Apache Struts 2,...
Continue Reading
phishing attack android mobile hacking malware mobile app

Android Users Get Phishing Attack via Fake Missed Calls

Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server.   The...
Continue Reading
instagram records social media compromised data

Cache of 49 million Instagram records found online

Huge amount of Instagram records has been exposed by Anurag sen a security researcher. Instagram was so far clueless on how this unsecured profile ended up online. The Instagram data included user bios, profile pictures, followers’ numbers and location. This information is viewable online. According to online tech publishing firm, which incidentally, broke the story. It...
Continue Reading
game of thrones got phishing malware antiphishing antimalware

Game of Thrones Phishing Scam – Beware!

The popular series’ – Game of Thrones’ – fans have been eagerly awaiting the weekly episodes of this wildly popular series in its final season. With this anticipation and enthusiasm for the show, comes an opportunity for phishing scam and hacker attacks.   This week, security researchers from well-known firms cited Game of Thrones as one...
Continue Reading
vpn malware

Bugged VPN Apps From Cisco, F5, Palo Alto and Pulse Probed by DHS

Several enterprise VPN apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division. An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public disclosure by CERT/CC, the...
Continue Reading
robinhood ransomeware malware antimalware

An Insight into The “Honest” RobinHood Ransomware

The world of cybersecurity is full of surprises. From using and downloading your Game of Thrones torrents to exploiting popular porn websites — notorious cybercriminals keep coming up with new ways to cause you harm. In a related development, a ransomware called RobinHood is spreading havoc in North Carolina, where the ransomware has crippled most city-owned...
Continue Reading
bank payroll phishing

Banks and Company Payrolls Fall Victim to Phishing Scam

Scams targeting tax professionals in phishing scam emails involving payroll direct deposit and wire transfer have been on the increase, warns the Internal Revenue Service. The IRS and its Security Summit partners report that these business email compromise/business email spoofing (BEC/BES) tactics generally target all types of industries and employers, but recently the service has received...
Continue Reading
bank of valletta hacked cybersecurity cyberattack

Bank Of Valletta Hacked – 10M Euros Recovered

Hackers have managed to hack the network of Malta’s Bank of Valletta and have consequently robbed the bank of at least 13 million euros. The Times of Malta had reported, on February 13th, of the Bank of Valletta suffering a hack, following which the hackers moved €13 million into foreign accounts. The report also stated that...
Continue Reading
online game databreach thieving mobile app

Mobile Gaming or Mobile Thieving?

Smartphone players often rely but get frustrated with the free mobile gaming mechanism, making them wait for a long period of time to advance and unlock some of it’s features. With this in mind, players end up finding ways to progress into the game. Now this is where the hackers come in. Popular mobile games such...
Continue Reading
us plate number hacked dataleak data leak darkweb dark web

US License Plate Scanning Provider Hacked – Data Now on Dark Web

Perceptics, the firm that bills itself as “the sole provider of stationary LPRs” (license plate readers) at border crossing lanes for privately owned vehicles in the U.S., has been hacked. Tens of thousands of its internal files are now reportedly floating around the dark web for anyone to download. According to several cyber-security research consultants, the...
Continue Reading
socialmedia impersonation phishing

Social Media Impersonation – Threat to Privacy

The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload as...
Continue Reading
googleusercontent malware antimalware

GoogleUserContent Images Being Used by Hackers to Spread Malware

Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malware. It’s as if regular hacking of websites and servers is not enough, these criminals  are now targeting legit hosted websites and its images such as GoogleUserContent and using them as a tool to exploit vulnerabilities while remaining undetected....
Continue Reading
robinhood ransomware malware protection malware attack

Malware Virus Removal Caused by RobinHood Ransomware Attack on Baltimore

Deciding whether you should pay a ransomware or not is a philosophical question until your systems were hit by a ransomware. The city of Baltimore is now on its fifth week battling a file-locking ransomware variant called RobinHood. It infected around 10,000 computers which prevents residents from obtaining building permits and business licenses including buying or...
Continue Reading
fbi academy hacked databreach data breach

Hackers Infiltrate FBI Academy – Agents’ Info Posted Online

Authorities were investigating the online posting by hackers on Saturday. The personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy. Cyber Security Researchers counted at least 1,400 unique records of employees of the FBI, Secret Service, Capitol Police, U.S. Park Police and other...
Continue Reading
phising email phishing anti phishing phishing solutions

Critical and Vulnerable Phishing Kits Found on GitHub

Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over. Phishing kits are packages of ready to deploy fake login pages targeting a wide range of online services, ranging from Gmail and Amazon to Microsoft and PayPal. The...
Continue Reading
phising email phishing anti phishing phishing solutions databreach data breach

Popular Fitness Program Suffers Security Breach

The world-renowned fitness platform – Bodybuilding.com has suffered a data breach in which personal data of registered users has been accessed. The breach was identified in February 2019 and after conducting an investigation it was revealed that it was a result of a phishing attack carried out in July 2018. Although the exact number of victims...
Continue Reading
antiphising anti-phising phising attack

Fake online travel booking sites trapping travelers to phishing attacks

As we all know, online travel booking sites provides many advantages to travelers. It offers hassle-free management of bookings as it works 24/7, faster payment transaction, and less phone time. But nowadays where internet phishing is becoming more popular when it comes to online attacks, one should be very careful in choosing the best online travel...
Continue Reading
talktalk phising hacking cybercrime

Hacker sentenced for four years in jail after massive cyberattack on TalkTalk

Cyber hacker Daniel Kelley from Llanelli, South Wales was sentenced to four years of imprisonment after a massive hacking attack to telecoms firm Talk Talk and blackmailing former chief executive Dido Harding way back to 2015. After failing to get the GCSE grades he needed to get onto a computer course, Daniel hacked the system of...
Continue Reading
antimalware malware cryptocurrency

Rabbit Malware Found Attacking Linux Servers and IoT

Cyber security researchers have just discovered a new malware, called “Linux Rabbit,” that targeted Linux servers and Internet-of-Things (IoT) devices in a campaign that began in August 2018 and continued until October 2018. The campaign targeted devices in Russia, South Korea, the UK, and the US. The campaign utilizes two strains of malware that share the...
Continue Reading
1 2 3 4 19