corporate email hacking data breach databreach

Hackers Breach and Expose Corporate Email Accounts On The Web

Cyber Attackers have just discovered new ways to invade and breach corporate email accounts, which has resulted in a US$12-Billion cost to businesses over the last 3-5 years, according to Digital Shadows.   Compromised corporate email accounts are commonly traded on the dark web, where criminals can earn a pretty penny, particularly if the email accounts...
Continue Reading
babyshark baby shark malware phishing cryptocurrency

BabyShark Malware Attacks Continues On Think Tanks and CryptoCurrencies

Last February 2019, Security researchers identified several spear phishing emails sent in November 2018 containing new malware that shares infrastructure with playbooks associated with North Korean campaigns. The spear phishing emails were written to appear as though they were sent from a nuclear security expert who currently works as a consultant for in the U.S.  ...
Continue Reading
shubert organization databreach data breach

Shubert Organization Suffers Data Breach

The Shubert Organization – one of the largest operations in theatre both on and beyond Broadway – has suffered a data breach, including customer email addresses, names, and credit card numbers and expiration dates.   Shubert is the owner and operator of 17 Broadway theaters and six off-Broadway venues, as well as a ticketing service Shubert...
Continue Reading
safari browser spoofing phishing

Safari Browser Vulnerability Exposes URL Spoofing

A cyber-security researcher based in Pakistan has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari Browser for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still unpatched, potentially leaving Apple...
Continue Reading
Remote Trojans

Nigerian Fraudsters Prefer Remote Trojans For Scamming

Nigerian business email compromise scams are growing more dangerous and sophisticated as cybercriminals add new tools and techniques to their arsenal such as remote access trojans (RATs) and advanced information stealers. But even beyond soaring cybercriminal incidents, criminals are becoming less of a pesky threat, such as Nigerian Prince 419-style email scams, and more dangerous. Unit...
Continue Reading
cryptojacking malware

CryptoJacking Malware Functions Under The Radar

Analysis of new malware samples used by the Rocke group for cryptojacking reveals code that uninstalls from Linux servers multiple cloud security and monitoring products developed by Tencent Cloud and Alibaba Cloud.   Rocke’s goal is to compromise Linux machines and use them to mine for Monero cryptocurrency. They exploit several vulnerabilities in Apache Struts 2,...
Continue Reading
phishing attack android mobile hacking malware mobile app

Android Users Get Phishing Attack via Fake Missed Calls

Phishing attack hacker are abusing the notifications and push APIs on Android devices to send spam alerts that are customized to look like a missed call. Both APIs are used on mobile devices for push notifications – short messages intended to re-engage the user. Messages can be triggered by a local application or server.   The...
Continue Reading
instagram records social media compromised data

Cache of 49 million Instagram records found online

Huge amount of Instagram records has been exposed by Anurag sen a security researcher. Instagram was so far clueless on how this unsecured profile ended up online. The Instagram data included user bios, profile pictures, followers’ numbers and location. This information is viewable online. According to online tech publishing firm, which incidentally, broke the story. It...
Continue Reading
game of thrones got phishing malware antiphishing antimalware

Game of Thrones Phishing Scam – Beware!

The popular series’ – Game of Thrones’ – fans have been eagerly awaiting the weekly episodes of this wildly popular series in its final season. With this anticipation and enthusiasm for the show, comes an opportunity for phishing scam and hacker attacks.   This week, security researchers from well-known firms cited Game of Thrones as one...
Continue Reading
vpn malware

Bugged VPN Apps From Cisco, F5, Palo Alto and Pulse Probed by DHS

Several enterprise VPN apps are vulnerable to a security bug that can allow an attacker to remotely break into a company’s internal network, according to a warning issued by The Department of Homeland Security’s cybersecurity division. An alert was published Friday by the government’s Cybersecurity and Infrastructure Security Agency following a public disclosure by CERT/CC, the...
Continue Reading
robinhood ransomeware malware antimalware

An Insight into The “Honest” RobinHood Ransomware

The world of cybersecurity is full of surprises. From using and downloading your Game of Thrones torrents to exploiting popular porn websites — notorious cybercriminals keep coming up with new ways to cause you harm. In a related development, a ransomware called RobinHood is spreading havoc in North Carolina, where the ransomware has crippled most city-owned...
Continue Reading
bank payroll phishing

Banks and Company Payrolls Fall Victim to Phishing Scam

Scams targeting tax professionals in phishing scam emails involving payroll direct deposit and wire transfer have been on the increase, warns the Internal Revenue Service. The IRS and its Security Summit partners report that these business email compromise/business email spoofing (BEC/BES) tactics generally target all types of industries and employers, but recently the service has received...
Continue Reading
bank of valletta hacked cybersecurity cyberattack

Bank Of Valletta Hacked – 10M Euros Recovered

Hackers have managed to hack the network of Malta’s Bank of Valletta and have consequently robbed the bank of at least 13 million euros. The Times of Malta had reported, on February 13th, of the Bank of Valletta suffering a hack, following which the hackers moved €13 million into foreign accounts. The report also stated that...
Continue Reading
online game databreach thieving mobile app

Mobile Gaming or Mobile Thieving?

Smartphone players often rely but get frustrated with the free mobile gaming mechanism, making them wait for a long period of time to advance and unlock some of it’s features. With this in mind, players end up finding ways to progress into the game. Now this is where the hackers come in. Popular mobile games such...
Continue Reading
us plate number hacked dataleak data leak darkweb dark web

US License Plate Scanning Provider Hacked – Data Now on Dark Web

Perceptics, the firm that bills itself as “the sole provider of stationary LPRs” (license plate readers) at border crossing lanes for privately owned vehicles in the U.S., has been hacked. Tens of thousands of its internal files are now reportedly floating around the dark web for anyone to download. According to several cyber-security research consultants, the...
Continue Reading
socialmedia impersonation phishing

Social Media Impersonation – Threat to Privacy

The overall number of social media impersonation increased 11-fold from December 2016 to December 2018, with the bad actors bent on collecting credentials and PII. Impersonators are most commonly found on Facebook, Twitter, Google+, though impersonators were also found on Instagram, YouTube and LinkedIn. Nearly half of all nefarious social media impersonators disguise their payload as...
Continue Reading
googleusercontent malware antimalware

GoogleUserContent Images Being Used by Hackers to Spread Malware

Cyber attackers are getting really creative and resourceful when it comes to infecting users and machines with Malware. It’s as if regular hacking of websites and servers is not enough, these criminals  are now targeting legit hosted websites and its images such as GoogleUserContent and using them as a tool to exploit vulnerabilities while remaining undetected....
Continue Reading
robinhood ransomware malware protection malware attack

Malware Virus Removal Caused by RobinHood Ransomware Attack on Baltimore

Deciding whether you should pay a ransomware or not is a philosophical question until your systems were hit by a ransomware. The city of Baltimore is now on its fifth week battling a file-locking ransomware variant called RobinHood. It infected around 10,000 computers which prevents residents from obtaining building permits and business licenses including buying or...
Continue Reading
fbi academy hacked databreach data breach

Hackers Infiltrate FBI Academy – Agents’ Info Posted Online

Authorities were investigating the online posting by hackers on Saturday. The personal information of hundreds of federal agents and police officers apparently stolen from websites affiliated with alumni of the FBI’s National Academy. Cyber Security Researchers counted at least 1,400 unique records of employees of the FBI, Secret Service, Capitol Police, U.S. Park Police and other...
Continue Reading
phising email phishing anti phishing phishing solutions

Critical and Vulnerable Phishing Kits Found on GitHub

Many phishing kits come with web app vulnerabilities that could expose the servers used for their deployment to new attacks which could lead to full server take over. Phishing kits are packages of ready to deploy fake login pages targeting a wide range of online services, ranging from Gmail and Amazon to Microsoft and PayPal. The...
Continue Reading
1 2 3 4 5 20