Blog

botnet hackers unsecured ENV files internet

Botnets being used by Hackers to scan The Internet for Unsecured ENV Files

Moving stealthily in the background, several hackers have been scouring the internet in a vast and massive search campaign that started probably 3-years ago. The targets of their search campaign are the exposed and unprotected ENV files on multiple web servers worldwide. ENV files (environment files) are data files used by an operating system on a...
Continue Reading
UK anti-disinformation campaign covid-19 social media monitoring cozy bear group apt26

UK launches anti-disinformation campaign on Covid-19 vaccine

The ongoing pandemic has just added to the existing mutual competition between nations, especially those listed in the first world country category. In the world’s current situation, every prominent government has been running to immediately develop the Covid-19 vaccine to solve this issue. The perception that the first to produce will surely put them on the...
Continue Reading
qbot malware election campaign spam phishing email malspam

Qbot Malware email phishing using election campaigns

With the United States on the hot plate with its current election, recent QBot attacks have also been observed working its dreaded activity simultaneously. Cybersecurity experts have submitted their malware analysis report containing evidence of infected attachment with the subject of the 2020 Election of the most powerful nation in the world. Based on the evidence...
Continue Reading
Prestige Software data leak misconfigured storage

Prestige Software hotel reservation system Data Leak

Approximately a whopping 25 GB of sensitive personal information was leaked on the net from a misconfigured AWS S3 bucket of Prestige Software. The company is based in Barcelona, Spain that caters to software-based solutions mostly for Cloud Hospitality. The company’s few well-known clients are Expedia, Amadeus, Booking.com, Hotels.com, Agoda, Omnibees, and other similar businesses that...
Continue Reading
hospitals healthcare ryuk trickbot ransomware malware trojan

Hospitals still targeted by the Ryuk Trickbot Ransomware

With the ongoing battle with the Covid-19 pandemic, so is the exploitation of many health institutions being compromised by many adversaries. On the recently submitted report, which is based on the collaborative investigation performed by Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation, and Department of Health and Human Services of the United States,...
Continue Reading
germany Miltenyi Biotec malware attack ransomware

German company Miltenyi Biotec suffered a Malware attack

Headquartered in Gladbach, Germany, Miltenyi Biotec, a private biotechnology company, has announced that they have fully recovered from a malware attack that recently affected some portions of their network over the past couple of weeks.  Miltenyi Biotec has been working on COVID 19 related products. From their website’s official statement, they disclosed an isolated case in...
Continue Reading
animal jam data breach compromised data dark web

Animal Jam Data Breach

Gaining popularity since 2010, Animal Jam has recently reported a compromised exposure about its 45 million accounts that have been auctioned on the dark web. Its creator, WildWorks, confirmed the breach and already investigating the extent of the data loss.  Animal Jam has been developed targeting kids aged from 4 – 11 years old, offering an...
Continue Reading
Russian hackers Fancy Bear US Democratic Parties

Fancy Bear Hacking Group from Russia allegedly pursued US Democratic Parties

A renowned Russian hacking group known as Fancy Bear is identified as the primary faction responsible for several United States Democrat parties’ most recent attacks. They are looking to repeat the similar assaults that happened a few years ago, during the election year involving the Clinton campaign of 2016. The group was also known as Strontium...
Continue Reading
Vastaamo healthcare ransomware attack malware data breach

Hackers used Data Breach for blackmail of Vastaamo Healthcare firm

A previous hacking incident involving a Finnish healthcare firm, Vastaamo, just became the highlight of another, more sinister ransom campaign in which analysts consider the evilest concept to ever come out of the cybercrime drawing board. It comes as a shock, even for other hacking groups, evaluating how they used all aspects of their attack to...
Continue Reading
capcom ransomware attack ragnar locker

Gaming giant CAPCOM falls to Ransomware Attack

Just last week, a renowned gaming giant, CAPCOM, suffered a data breach. The hacking incident significantly affected the gaming giant’s internal network systems, and hackers taking away more than 1 terabyte (TB) of sensitive company information. It was immediately identified that the hacking attack was made using the Ragnar Locker Ransomware, a somewhat notorious malware-rigged software...
Continue Reading
iranian hackers US voter's data hacking FBI

State-sponsored Iranian Hackers infiltrated and stole US Voter’s Data

A recent advisory from the United States Cybersecurity Agency reveals another alarming incident related to US election activities. It was known that a group of Iranian hackers infiltrated and accessed a large number of US voters’ registration information and attempted to access similar contents from other states. According to undisclosed sources, the attacks were coordinated, went...
Continue Reading
pay2key ransomware attacks israel malware antimalware cyber attacks

Surge in Ransomware attacks in Israel: New ransomware discovered – Pay2Key

In the cyber kill chain, each stage is critical. Security awareness and precautions should take in place to mitigate the risk. A considerable number of cyber-attack criminals are now targeting Israeli companies using ransomware. Researchers confirmed that most of the attacks were correlated to a new variant of ransomware called Pay2Key. Investigations revealed that the attackers could...
Continue Reading
true social media mobile app compromised data exposed database

True social media mobile app exposed private data and messages

The True social media mobile app that prides itself on protecting user privacy had a security lapse that left their servers exposed to the public. The spilled private data were left for anyone on the internet to read. The social media mobile app was launched in 2017 by Hello Mobile, a small virtual cell carrier that...
Continue Reading
State of Louisiana US Remote Access Trojan malware ransomware

RAT Attack: State of Louisiana Hit with Pre-election Cyber Incident

Just last week, hackers have begun to infiltrate and deliberately breached various local establishments and government workplaces in Louisiana. This shocking and unexpected activity prompted the local state government to enlist the National Guard’s assistance to try and ward off the attacks. Security researchers have been summoned and reported the said activities last week, Friday. The...
Continue Reading
Pfizer customer prescription call transcript data leak compromised data

Pharma Giant Pfizer leaks customer prescription info, call transcripts

Cybersecurity Researchers have uncovered a misconfigured Google Cloud Storage bucket that belongs to a Pharma giant, Pfizer. The newly discovered leak holds private medical data of hundreds of patients that take various Pfizer drugs such as Lyrica, Chantix, Viagra, and other cancer treatment drugs. Moreover, the exposed data also includes conversations from Pfizer’s Interactive Voice Response...
Continue Reading
Comcast Cable remote tv box set vulnerability exploit malicious code injection WarezThe Remote

Comcast Cable remotes and TV top box vulnerability

A recent update to TV top box software has been released by Comcast to its 18 million devices used at home for digital TV subscribers in the United States region. Affected devices are specifically the XR11 entertainment platform. This has been immediately patched after cybersecurity ethical hackers able to scrutinized and hacked its communication platform. Based...
Continue Reading
gravityrat malware Android macOS mobile devices spyware

The resurgence of espionage GravityRAT: Android and macOS

Android phones and Mac gadgets are some of the devices that are commonly used by individuals worldwide. Roughly, there are 5 billion mobile users globally, and 3 billion are using smartphones. Research says that a person spends three hours and fifteen minutes on their mobile phones daily. The consumption still depends on the generation and character...
Continue Reading
georgia county ransomware attack malware us election

Georgia County Voters’ Database hit by Ransomware just weeks before election

A most recent ransomware campaign that staggered a Local Georgia county government allegedly impaired a database to confirm voters’ signatures within the verification of absentee ballots. It is the primary detailed case of a ransomware assault influencing an election-related framework within the 2020 cycle. Government authorities and cybersecurity specialists are particularly concerned that ransomware assaults —...
Continue Reading
donald trump campaign website hacked us election defacement

Donald Trump campaign website hacked

The official campaign website of the United States President Donald Trump was reportedly defaced for almost half an hour on Tuesday, October 27, shortly before 4:00PM PST. A journalist at Jewish News of Northern California, Gabriel Lorenzo Greschler, was reportedly among the first to spot the defacement while researching a climate change article and immediately posted...
Continue Reading
Ubisoft Crytek Egregor Ransomware Malware

New Ransomware Family Egregor attacked Ubisoft and Crytek

Recently, a new ransomware family group called Egregor has reportedly stolen data from Ubisoft and Crytek – two of the largest gaming companies worldwide. These two gaming companies are well known for popular games such as Assassin’s Creed, Far Cry, and Tom Clancy’s video game series. Gaming companies are also one of the main targets of...
Continue Reading
1 2 3 4 5 30