Blog

Nine Major Phishing Attacks of 2018

Nine Major Phishing Attacks of 2018 (and How to Spot Them)

The subtle elements of phishing tricks change from year to year. Here, we will talk about phishing email models from a portion of the best phishing plans of 2018. 1. Record Verification Attachments as email bait from legitimate website poses from major company believing that some issue exist with your account.   2. Cloud-Based File Sharing...
Continue Reading
Phishing and Fraud Opportunities on the Vulnerability

Vulnerability: Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command

Phishing and Fraud Opportunities on the Vulnerability: Root access on most devices is severe to the point that everything on your machine can be copied and sniffed out to a hacker’s computer. Search for malware alone won’t suffice, because vulnerabilities cannot be simply scanned through normal malware protection, so much for malware detection alone too. Below...
Continue Reading
torrent clients

TORRENTING: You could be helping hackers – and you don’t know it

TORRENTING: You could be helping hackers – and you don’t know it Every time you use your torrent client, you take a gamble. It doesn’t matter if it’s the usual chance of running in with some copyright organization; the web traffic using your torrent client is rarely 100% legal. But with technological advancements and research from...
Continue Reading
Rakhni Trojan: A New Breed of Cryptomining

Rakhni Trojan: A New Breed of Cryptomining

Rakhni, an old ransomware dating as far back as the year 2013, recently stepped up its game by adding a new devastating algorithm with its arsenal of attacks. It now decides whether to demand ransomware or secretly profit by installing a miner. How It Works The malware is shared via email attachment, often disguised as financial-related...
Continue Reading
Magecart have gotten smarter with their global card-skimming tactic

Magecart have gotten smarter with their global card-skimming tactic

In the wake of Ticketmaster UK’s website hacking by the infamous Magecart threat group just weeks ago, researchers have discovered how they managed to pull this no-easy-feat off: by hacking their third-party suppliers first. Magecart have already attacked over 800 e-commerce sites to date, and a huge of them can be credited to their employment of...
Continue Reading
Clipboard Hijack

Clipboard Hijack

A new clipboard hijacking malware has been discovered this June, specifically targeting cryptocurrency credentials on matching accounts, mainly destination addresses, most notably for Bitcoin and Etherium users. So far, it has infected an estimated 300,000 computers worldwide, with a huge percentage running on Windows. In case you were wondering how this works, cryptocurrency transfers require users...
Continue Reading
A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Rakhni: A Virus that decides whether your PC is good for Crypto-Mining or Ransomware

Ransomware and Cryptocurrency mining attacks have been very frequent this year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature but make...
Continue Reading
Credit Card Breach

Dark Web: Credit Card Breach Dubbed Arabian Nights

Illicit cyber activities has been going on in the dark web. Despite the efforts of authorities and lawful groups, the trend of the black hats and cybercriminals still continues. Lately this month of July a dark web carding store known as Joker’s Stash has been releasing breached cards and dumps information from all around the world...
Continue Reading
Huge Data Breach Uncovers Industry Secrets

Huge Data Breach Uncovers Industry Secrets

Cyber Attacks are getting more and more frequent nowadays. From government institutions to hospitals, banks and other financial institutions. There’s almost no rest for cyber criminals and the amount of illegal activities they couldn’t accomplish. And their newest victim – The Auto Industry. Car manufacturers, or all manufacturers in general – normally go to great lengths...
Continue Reading
Protecting your Website against Cyber Attacks

Protecting your Website against Cyber Attacks

For an individual or any business their website and its contents mean a lot to them. It can be considered a very important asset or property in this digital age. A person or a group of people devote their time, effort, and other valuable resources to make sure that these assets are protected and secure. But...
Continue Reading
Cyber Hacking in Singapore’s Healthcare Systems

Cyber Hacking in Singapore’s Healthcare Systems

Cyber attackers have just stolen a whole bunch of personal and patient data in a record-breaking hack which occurred Friday, July 20th. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals (SingHealth) and other healthcare institutions. More than 1 Million patient’s personal records have been...
Continue Reading
Magniber Ransomware goes Global

Magniber Ransomware goes Global

Magniber has officially gone global. After painstakingly targeting only South Korean users, the ransomware expands its target landscape to Chinese locations (Macau, China, Singapore) and Malay ones (Malaysia, Brunei) with more sophistication in its coding. It may be a matter of time till it goes global. This ransomware wasn’t impressive before. It relied heavily with Command...
Continue Reading
Cheap Android Smartphones discovered to have pre-installed Malware

Cheap Android Smartphones discovered to have pre-installed Malware

Unfortunately for Android smartphone users coming from developing countries with usually low privacy protections, a cheap smartphone could come with a hidden cost: Low-end Android smartphone devices mostly sold at developing markets such as Egypt, Brazil, South Africa, Myanmar, etc., contain pre-installed malware. The malware to blame is com.rock.gota, but it masks itself quite ingeniously by...
Continue Reading
Money Laundering via Mobile Gaming

Money Laundering via Mobile Gaming

For anyone who has played many of the popular smartphone games will definitely agree, the need for in-game currency is essential. Most of the players are hooked upon the notion that in order to advance substantially in the game is to use or purchase their currency. Smartphone gamers often rely but get frustrated with the free...
Continue Reading
social media accounts

Polar Fitness App Data Breach

A popular trend in the mobile app market that recently suffered a data breach is involving fitness apps. Nike Plus, Strava, adidas miCoach and a slew of other apps have been developed to better track the fitness regiments of people globally. Polar, another popular fitness app, tried to up the ante by adding a feature called...
Continue Reading
GPS Spoofing: A Growing Threat

GPS Spoofing: A Growing Threat

With today’s modern technology, long drives are a thing of the past. Traveling and navigating is as easy as typing the location into your mobile device and voila! You now have a clear path towards your destination. It’s all thanks to the good ol’ GPS (Global Positioning System). As long as you have your smartphone with...
Continue Reading
DomainFactory Hacked!

DomainFactory Hacked!

One of the largest hosting companies in Germany, DomainFactory, has been penetrated by hackers. The hosting company, owned by GoDaddy since 2016, reported that the data breach happened around late January 2018, but the company found out about the incident just last week, July 3rd, after the alleged Hacker began sharing bits of the stolen information...
Continue Reading
Google Images Plagued by Malwares

Google Images Plagued by Malware

Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malwares. It’s as if regular hacking of websites and servers is not enough, these criminals are now targeting legit hosted websites and its images, and using them as a tool to exploit vulnerabilities while remaining undetected. What’s even worse...
Continue Reading
Dharma Ransomware weaponizes itself with fresh Cmb variant

Dharma Ransomware weaponizes itself with fresh Cmb variant

While security experts are still not finish decrypting newer variants of Dharma ransomed files (which terrorizes the digital landscape with its prolific Ransomware releases lately), it again strikes back using a .cmb encryption. It appears as if this malicious malware is expected to surface for a while, for currently no decryption method is working as a...
Continue Reading
hacker

The Hacker Just Got Hacked!

The Lokibot malware is a Banking Trojan designed for information theft. It’s been around since 2015 and has targeted many users for quite some time. The original malware was created by “Carter”, a.k.a. “Lokistov”. It was then sold and distributed on the underground market (dark web) for prices ranging from $80 to as high as $350....
Continue Reading
1 2 3 4 5 14

Categories