Blog

Numerous Phishing Attacks Targeting Universities

Numerous Phishing Attacks Targeting Universities

Universities around the nation, alongside understudies and staff, might need to be more careful on the web, cautioned by an AV Firm after scientists identified almost 1,000 phishing endeavors hitting somewhere around 131 colleges in 16 nations in the course of the most recent year. As per scientists, digital crooks are focusing on clients with fake...
Continue Reading
New BotNet Entraps Your Smart Devices to Initiate DDoS Attacks

New BotNet Entraps Your Smart Devices to Initiate DDoS Attacks

Another botnet which is focusing on ineffectively anchored Web of Things (IoT) gadgets and servers with the end goal of Distributed-Denial-of-Service (DDoS) assaults.   The primary Chalubo bot isn’t just receiving confusion methods all the more regularly found in Windows-based malware but at the same time is utilizing code from Xor.DDoS and Mirai, the last of...
Continue Reading
Hackers Using Phishing Scams to Drive New Browser Hijacker

Hackers Using Phishing Scams to Drive New Browser Hijacker

Another phishing effort has been found that sidetracks clients to a hijacking malware. The phishing procedure utilized in this battle is additionally usually utilized by technical support tricks, that are known to utilize terrify strategies to bait exploited people. In this phishing effort, an email message shows a phony blunder message and telephone number. The message...
Continue Reading
The Usual Black Friday

The Usual Black Friday

What will you do this Black Friday? Me? I’m super energized, I’ll be… It’ll be extraordinary in light of the fact that… … Goodness I can’t lie. Like many individuals who work in IT I’ll be stowing away under my work area, trusting that everything will pass and endeavoring to fight off every one of the...
Continue Reading
Chinese Malware Returns with a Vengeance

Chinese Malware Returns with a Vengeance

In 2013, InfoSec firm Mandiant released a blockbuster security report covering a state-supported hacking group known as APT1, or Comment Crew. The Chinese hackers accomplished a lasting infamy, attached to the effective hacks of in excess of 100 US organizations and the exfiltration of several terabytes of information. In particular, analysts have discovered a malware that...
Continue Reading
Cryptohackers Breach StatCounter to Steal Bitcoins

Cryptohackers Breach StatCounter to Steal Bitcoins

Cryptocurrency suffered big revenue loss since the beginning of 2017 as hackers find it more lucrative leaving Ransomware behind, That is (US)$882 million in funds stolen via focused assaults throughout at the least 14 exchanges. This hack provides another to the checklist,” Waller advised TechNewsWorld. CyrGate.io bitcoin exchange platform account holders were breached after adding malicious...
Continue Reading
Hetzner Suffers Yet Another Data Breach

Hetzner Suffers Yet Another Data Breach

South African subsidiary of Germany’s Hetzner Online, has advised customers that it has been a victim of a “data breach” which likely exposed all of their customers data. The data breach, according to Hetzner, was uncovered by their cyber security research team on October 5th 2018 when they apparently noticed an “unusual network activity.” The ISP...
Continue Reading
US Department of Defense Weapons Systems

9 Seconds: That’s How Long It Took to Guess US Department of Defense Weapons Systems Password

The US Department of Defense analyzers found noteworthy vulnerabilities in the division’s weapon frameworks, some of which started with poor essential secret key security or absence of encryption. As past hacks of government frameworks, similar to the rupture at the Workplace of Faculty Administration or the break of the DOD’s unclassified email server, have shown us,...
Continue Reading
Mobile Phone Security

Mobile Phone Security: All You Need to Know

In the advent of 21 Century Smartphones are gaining its popularity which distinguish from “featured” phones by their hardware capabilities and extensive mobile operating systems, that facilitate software, internet and multimedia functionality of which includes music, video, cameras and gaming, alongside core phone functions such as voice calls and text messaging.  Mobilephones are much more reliable...
Continue Reading
BotNet Affecting IoT Devices and Linux Servers

BotNet Affecting IoT Devices and Linux Servers

Security specialists from a cyber-security firm have found an IRC bot named as Shellbot that is focusing on Internet of Things (IoT) gadgets and Linux servers. The botnet is additionally fit for influencing Windows frameworks and Android gadgets. Usual Methodology The IRC bot is engineered with the assistance of a Shellbot variation that is composed in...
Continue Reading
Carding Works on Playstore: Games and Everything Else

Carding Works on Playstore : Games and Everything Else

The Dark web is full of contents that ranges from illegal weapons up to anything legal you may find. In today’s article we will expose what and how vulnerable Google Playstore is with some items we can find in the dark web. Those are stolen financial credentials that were skimmed, sniffed, and scanned from POS, ATMs,...
Continue Reading
dark web sites

Dark web Breaches November 13

As a Dark web expert with an expertise in monitoring tor sites and hidden services, We have been encountering many contents that are disturbing and straightforward illegal being peddled around the internet both surface and deep part of the web. A researcher like me discover that these things are the usual in the dark web especially...
Continue Reading
Banking Trojan that sniffs out browser and password history

Banking Trojan that sniffs out browser and password history

The banking malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is to steal...
Continue Reading
ICANN’s Response to GDPR: Temporary Specification Survey

ICANN’s Response to GDPR: Temporary Specification Survey

Last October 31st we have posted an article on how GDPR of EU has affected and will continue to affect the fight against cybercrime, that being said with respect to the law passed for EU members ICANN has issued its response for the purpose of compliance. Since the response of ICANN was effective and already implemented,...
Continue Reading
US Election Day: No Malicious Cyber Activity So Far

US Election Day: No Malicious Cyber Activity So Far

As midterm decision results are counted, authorities said Tuesday that they have not seen any pernicious digital action focusing on the election framework. Branch of Homeland Security authorities held intermittent press calls to issue refreshes Tuesday, tending to in the event that they’ve needed to manage endeavored obstruction. Soon after 9 p.m. EST, authorities were keeping...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web

Hackers Found Selling Pakistani Bank Data on the Dark Web

Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out how...
Continue Reading
100K Home Routers Hacked via UPnP Vulnerability

100K Home Routers Hacked via UPnP Vulnerability

By and by, a hundred thousand or more home switches have been press-ganged into a spam-heaving botnet, this time by means of Universal Plug and Play (UPnP). As indicated by brainiacs from 360 Netlab, the malware misuses vulnerabilities in a Broadcom UPnP usage to taint helpless portals, and that implies a heap of switch makers are...
Continue Reading
US$7.5M Worth of CryptoCurrencies stolen from Trade.io

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

Cyber Criminals have effectively pulled back 1.3 million of the stolen tokens. The Swiss cryptographic money trade is as yet exploring the reason for the rupture. Switzerland-based digital money trade Trade.io endured a break that brought about programmers taking around 50 million TIO (Trade.io tokens) from one of its wallets that was held in cool stockpiling....
Continue Reading
American Express Data Breach Exposed 700K User Info

American Express Data Breach Exposed 700K User Info

Around 700,000 clients of American Express India’s information were left uncovered in an unbound database. The unintentional information spill was caused by a MongoDB server that was left uncovered with no secret phrase security. The unbound database contained 689,272 records in plaintext and available to anybody on the web. As per Bob Diachenko, Chief of Cyber...
Continue Reading
Hijacking UK Email Accounts for Phishing

Hijacking UK Email Accounts for Phishing

There has been a significant rise in stolen corporate email accounts that are being used in phishing attempts. This is according to a new report by security experts Barracuda. The security firm is claiming email accounts from employees all over the UK are being stolen. Hackers would then log into these accounts remotely and, posing as...
Continue Reading
1 2 3 4 9

Categories