Blog

HSBC USA Hacked

HSBC USA Hacked – User Data Compromised

HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018.   What was the...
Continue Reading
Stuxnet malware

Iran Got Hit by Powerful StuxNet 2.0 Malware

Iranian systems were as of late allegedly hit by another all the more ground-breaking variation of the notorious Stuxnet malware. The new Stuxnet variation is purportedly more forceful and modern. The malware was first found eight years prior when it focused on Iran’s atomic frameworks.   The Stuxnet virus was uncovered some eight years ago, and...
Continue Reading
IronChat Cracked by Law Enforcement Revealing

IronChat Cracked by Law Enforcement Revealing Almost 300K Messages from Suspected Criminals

Dutch police have uncovered that they could keep an eye on the interchanges of in-excess of 100 presumed crooks, observing live as over a fourth of a million chat messages were traded. The scrambled messages were sent utilizing IronChat, an apparently secure encoded messaging administration accessible on BlackBox IronPhones.   The site of Blackbox Security used...
Continue Reading
email phishing scams

Dubai’s Biggest Bank Falls Victim to Tax Refund Phishing Scam

Dubai’s largest bank has cautioned clients to be careful with another phishing email trick which professes to offer VAT discounts. Emirates NBD cautioned that an email with the headline VAT Refund Notification, professing to be from the bank, ought not to be opened.   “We ask you to be very watchful and dependably check the source...
Continue Reading
Default Cisco Admin Account Exposes Switches to Remote Attacks

Default Cisco Admin Account Exposes Switches to Remote Attacks

A default account present in Cisco Small Business switches can enable remote assailants to increase finish access to defenseless gadgets. The systems administration goliath presently can’t seem to discharge patches, yet a workaround is accessible. As indicated by Cisco, Small Business switches running any product discharge accompany a default account that is accommodated the underlying login....
Continue Reading
Elon Musk CryptoJackers Hijack Legit Accounts

Elon Musk CryptoJackers Hijack Legit Accounts

Tricksters are back on Twitter imitating their most loved big name, Elon Musk, in an offer to persuade individuals to put resources into their imposter Bitcoin plot.   This time, the plan brings up difficult issues over the fact that it is so natural to seize and modify confirmed records on the informal organization. For this...
Continue Reading
AI Weapon against Cyber Attacks on The Dark Web

DARKMENTION: AI Weapon against Cyber Attacks on The Dark Web

Cybersecurity is one of the essential worries of web clients these days, which incorporates business and legislative associations too. Later, vast scale information ruptures at Gmail, Equifax, Facebook, Google+ Cathay Pacific Airways, and Yahoo, and so on. Have clarified that the greater the association, the higher would be the cybersecurity danger. The job of Dark Web...
Continue Reading
Cyber Hackers Attacked Irish Citizens with Email Fraud

Cyber Hackers Attacked Irish Citizens with Email Fraud

Digital offenders are focusing on Irish clients as a major aspect of a worldwide email coercion battle, a main digital security organization has cautioned. SkOUT Secure Knowledge, which gives digital security innovation and answers for organizations, associations and SMEs and has its EMEA central command in Portlaoise, has detailed a sharp increment in the quantity of...
Continue Reading
Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019.   “The threat landscape is undoubtedly evolving;...
Continue Reading
DanaBot Banking Trojan Found Targeting European Countries

DanaBot Banking Trojan Found Targeting European Countries

Security specialists from ESET unravel banking trojan named DanaBot being dispersed to European nations by means of spam messages. DanaBot is prominent for its multistage disease chain and secluded design. Earlier research from Trustwave, alongside ESET’s new research, recognizes DanaBot as containing a few segments — generally as powerful connection libraries (DLL) — that perform separate...
Continue Reading
Smoke Loader Malware just got heavier with PROPagate Injection

Smoke Loader Malware just got heavier with PROPagate Injection

A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the user...
Continue Reading
technical support scams

Tech Support Scams Part 2: Freezing Chrome Browser to Panic Victims

We’ve tackled about fake tech support helpers in the past, pretending to fix PCs in exchange for either a fee or a victim’s credit card information. Now a certain exploit that Google Chrome already fixed last February has resurfaced – scammers trying to scare victims by making their browsers unresponsive. These scammers abuse a particular browser...
Continue Reading
Popular Browser Extension "Stylish" Discovered Stealing Your Browser Data

Popular Browser Extension “Stylish” Discovered Stealing Your Browser Data

Both Google Chrome and Mozilla Firefox issued a permanent ban against the browser add-on “Stylish”, after Robert Heaton, a software engineer, accidentally found out that it covertly records browser data and sends them to questionable remote servers. Stylish is an add-on that allows users to personalize any website they visit. From changing color scheme to its...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel

Social Engineering: Cyber Love gone Phishing Intel

Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication has...
Continue Reading
The Rotexy Trojan: banker and blocker

The Rotexy Trojan: banker and blocker

On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of this...
Continue Reading
data breach cost

What will a data breach cost you?

With our developing reliance on innovation, huge data breaches are more typical than any time in recent history. Between January 2005 and today, there have been more than 9000 breaks with more than 1.1 billion records uncovered, as per the ID Theft Resource Center. The biggest information breach in history was a hack on 500 million...
Continue Reading
online fraud

Responding to Impersonators (online fraud)

Falling victim to online fraud Numerous online opportunists rely on deception in order to fulfill their crimes. Those committing online fraud scams are getting considerably more innovative in imitating legitimate businesses to get your information. Phishing emails trying to persuade you to give personal information are the most common. Different impersonators attempt to motivate you to...
Continue Reading
Holiday shopping and holiday phishing

Holiday shopping and holiday phishing

November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From that...
Continue Reading
Marriott Database Leak

Marriott Database Leak : Where will the data go?

Marriott Database Leak: Where will the data go? Following up with the recent Marriott Database Leak which has been said to be state sponsored by a rival state of USA, the leak is severe and could have contained details that are vital which may have included credit card details. In case the hackers behind the breach...
Continue Reading
Firefox Monitor

Has that website been pwned? Firefox Monitor will tell you

Firefox Monitor, a breach warning site propelled by Mozilla in September, would now be able to convey cautions from inside Firefox program.  When the service goes live in the coming weeks, Firefox users running version 62 and later will see a symbol show up in the location bar when they visit a known breach site.  Tapping...
Continue Reading
1 2 3 4 14

Categories