Blog

Popular Browser Plugin – FoxIt – Has Vulnerabilities

Popular Browser Plugin – FoxIt – Has Vulnerabilities

Just recently, Cisco Talos took a closer look at the famous browser plugin called Foxit PDF Reader and found 18, yes, that’s right – 18 (eighteen) critical vulnerabilities. Widely known as an alternative to the famous Adobe Acrobat Reader, Foxit has been commonly known as a free-for-all tool designed to help users edit PDF (Portable Document...
Continue Reading
Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

Trusted SSL/TLS Certificates: The New Tool for Domain Spoofers

The holiday season is fast approaching – this is just the perfect opportunity for cybercriminals to scam shoppers out of their hard-earned money. According to Experian data, online shopping fraud attacks rose 30 percent in 2017 from 2016. Online shoppers can be totally duped in a number of unsuspecting ways – Phishing emails may be sent...
Continue Reading
USB Type C – A Hackers Gateway

USB Type C – A Hackers Gateway

Plugging in the power — or at least what you think is power — to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cyber-criminal steal your identity. The laptop may even be...
Continue Reading
anti spyware malware

Start-up Spyware Company from Germany Accidentally Exposed Its Data Online

A German-based spyware organization named Wolf Intelligence coincidentally uncovered its very own corporate information, including observation targets’ data, travel paper outputs of its organizer and family, accounts of gatherings and that’s just the beginning. The accidental leak uncovered around 20 GB of the organization’s information, which was left unprotected in a command and control server and...
Continue Reading
Trading Platform and Cryptocurrency Hacks Blamed on North Korea

Trading Platform and Cryptocurrency Hacks Blamed on North Korea

North Korea’s programmers and agents have completely embraced digital currency as a strategy for bypassing global authorizes and raising assets for the Pyongyang administration. Two reports discharged in the previous two weeks by Group-IB and Recorded Future, individually, uncover the profundities to which North Korea has gone to do as such, depending on hacks of digital...
Continue Reading
Security Weakpoint Impacts Multiple Linux and BSD Distros

Security Weakpoint Impacts Multiple Linux and BSD Distros

All Linux and BSD variations that use the X.Org server bundle contain a powerlessness, security scientists as of late unveiled. This blemish could enable an assailant with restricted benefits to raise benefits and gain root framework get to, either utilizing a terminal or SSH session. Commonly, if a powerless variant of X.Org keeps running on a...
Continue Reading
Saudi PetroChem Plant Hacking Blamed On Russians

Saudi PetroChem Plant Hacking Blamed On Russians

Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of framework....
Continue Reading
Phony Android Apps Posing as CryptoMiners

Phony Android Apps Posing as CryptoMiners

Several Android applications were discovered acting like mineworkers for unminable digital forms of money, for example, Swell, Cardano, and Tie. The newfound malignant applications were discovered to have been “covering up under the radar” since May 2018. Security specialists have found a few pernicious Android applications hiding in outsider applications that are acting like digital money...
Continue Reading
Hackers Are Now Using Your Private Photos As Ransom

Hackers Are Now Using Your Private Photos As Ransom

Active smartphone users are being warned about a scary new piece of “ransomware” designed to send victims’ private photographs to all the contacts in their address book. The tech security firm McAfee has sounded the alarm over a new type of virus called LeakerLocker, reports The Sun. This creepy ransomware is capable of locking down someone’s...
Continue Reading
Online Love Scam Syndicate Busted

Online Love Scam Syndicate Busted

A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia around...
Continue Reading
Online Ad Firms Tracking Users via TLS Sessions Resumption

Online Ad Firms Tracking Users via TLS Sessions Resumption

In a research paper distributed toward the beginning of September, four specialists from the University of Hamburg, Germany, have uncovered that web based publicizing firms can mishandle the TLS Session Resumption instrument to track clients as they explore the web. The idea is straightforward. On the off chance that a web based publicizing firm loads promotions...
Continue Reading
Phishing Attack Impersonates Law Firm and Microsoft

Phishing Attack Impersonates Law Firm and Microsoft

The most common phishing attacks can often be quite convincing, but some more technologically-aligned users recognize something isn’t right when they see that the login form is unsecured or the SSL certificate doesn’t match the company being impersonated. Nevertheless, there is a new phishing attack that stores their phishing form on Azure Blob Storage, so that...
Continue Reading
The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banker is a banking Trojan that seems to be related to the Zeus Trojan. The Panda Banker, a recently uncovered banking Trojan, is related to one of the most famous and destructive banking Trojans in history. Zeus is quite an old threat that has spawned countless imitators. The Panda Banker is used to target...
Continue Reading
Tumblr Users’ Account Data Almost Leaked

Tumblr Users’ Account Data Almost Leaked

Tumblr today distributed a report conceding the nearness of a security weakness in its site that could have enabled programmers to take login accreditations and other private data for clients’ records. The influenced data included clients email addresses, secured (hashed and salted) account passwords, self-announced area (a component no longer accessible), beforehand utilized email addresses, last...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation

Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber space...
Continue Reading
Apollo Data Breach – 200 Million Records Stolen

Apollo Data Breach – 200 Million Records Stolen

A very large data repository of more than 200 million contact records were stolen from Apollo,  following a data breach incident, a predictive prospecting and sales engagement startup. The leaked information contained the following user information – Names Email Addresses Company Names Media Handles Phone Numbers Job Titles Apollo’s stolen database of records did not contain...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks

Hackers Prefer Tuesdays When Deploying Phishing Attacks

Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which highly...
Continue Reading
GhostDNS Malware Hacked 100K Routers For Phishing - iZOOlogic

GhostDNS Malware Hacked 100K Routers For Phishing

A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that sent...
Continue Reading
Hackers Selling Frequent Flyer Miles on the Dark Web

Hackers Selling Frequent Flyer Miles on the Dark Web

Dark web vendors have been found selling frequent flyer miles on underground forums. In August, around half a dozen illicit marketplaces on the Dark web were explored by security experts, who discovered how much each stolen frequent flyer reward point is worth. According to security researchers at CompariTech, who discovered the dark web sales of the...
Continue Reading
Facebook Breach

Facebook Breach….. Again?

-But this time they got leaked unintentionally. Last time Facebook was in hot water was the Cambridge Analytica along with Facebook that sold or leaked its users private information allegedly used for campaign sortees and strategies of election candidates. This was caused internally and it was a huge setback for the social media giant. But wait...
Continue Reading
1 2 3 4 5 9

Categories