Blog

Iranian Hackers Stormed Citrix

Iranian Hackers Stormed Citrix, Got Away with Terabytes of Data, Including Internal Secrets

Citrix has now disclosed a massive data leak by informing their customers that hackers intruded their network and stole their corporate secrets.   Affected Customers Citrix services the following businesses but not limited to: US Military Various US Government Agencies Whitehouse FBI With the above government entities itself, this data leak proves to be critical. A...
Continue Reading
Hackers Breached Australian Defense Contractor

Hackers Breached Australian Defense Contractor

One of Australia’s major defense service providers and shipbuilders – Austal was hit by an information rupture on November 1st, 2018. The malicious cyber criminals figured out how to take the ultra-touchy information of a couple of the company’s staff. In any case, the firm cases that there is no proof of burglary of national security...
Continue Reading
Office 365 phishing scam

Office 365 Phishing Strategy Tricks Users With Live Chat Support

Phishing attacks have now progressed toward becoming something of a day by day event for some. However, the motivation behind why these noxious attacks stay abundant lies in their resourcefulness. In time, we know about a clever phishing method that includes technical support as well. We are talking about an Office 365 phishing campaign that scams...
Continue Reading
Gate.io Bitcoin Transactions Breached by Hacking StatCounter

Gate.io Bitcoin Transactions Breached by Hacking StatCounter

Malicious Hackers have broken StatCounter, one of the web’s biggest web investigation stages, and have embedded pernicious code inside the organization’s principle website following content. As per Matthieu Faou, the ESET malware specialist who found the hack, this pernicious code seizes any Bitcoin exchanges made through the web interface of the Gate.io digital currency trade. “We...
Continue Reading
phishing Attacks

Phisher Announces More Attacks Against Hedge Funds and Financial Firms

Another phishing campaign called ” Beyond the Grave” targeted international hedge funds on January 9th, 2019. In an announcement presented on Bleeping Computer, the attackers have expressed that they will keep on targeting banking and financial institutions in the future. A part named Xander Bauer has made a post in the Bleeping Computer forums with a...
Continue Reading
DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI makes some of the most mainstream quadcopters available, yet its items have more than once drawn investigation from the United States government over protection and security concerns. Most as of late, the Department of Defense in May restricted the buy of customer rambles made by a bunch of merchants, including DJI. Presently DJI has fixed...
Continue Reading
GPU Channel

GPU Channel Attacks Pave Way for Data Theft

PC researchers at the University of California, Riverside have uncovered out of the blue how effectively assailants can utilize a PC’s illustrations handling unit, or GPU, to keep an eye on web movement, take passwords, and break into cloud-based applications. Marlan and Rosemary Bourns College of Engineering software engineering doctoral understudy Hoda Naghibijouybari and post-doctoral specialist...
Continue Reading
identity fraud and identity theft protection

When Aaadhaar leaks are real despite denial: This time an LPG Company did it

What is new? This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot hack...
Continue Reading
Evernote for Windows

Evernote Flaw Allowed Hackers to Create XSS Vulnerability and Steal Data

A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when the...
Continue Reading
Artificial Intelligence

How Artificial Intelligence Will Become Weaponized in Cyber Attacks

On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement through...
Continue Reading
Macos Malware

Macos Malware Releases an MITM Attack

Malware creators are continually searching for new and inventive approaches to stay away from location and increment benefits, so a report that an evidently new method was being conveyed against macOS clients a week ago made them start up our Virtual Machines to perceive what our foes had concocted this time.   Old Dog, New Tricks...
Continue Reading
DNS burrowing

MTN Vulnerability Could Allow Hackers To Steal Data

A security analyst as of late reached MyBroadband to report a weakness in the MTN arrange that could enable programmers to get free information utilizing DNS burrowing.   The Domain Name System (DNS) is an arrangement of servers on the Internet which empower the interpretation of comprehensible spaces, as mtn.co.za, into Internet Protocol addresses.   Burrowing...
Continue Reading
CryptoJacking

Massive CryptoJacking Carried Out Using Canadian University Network

Malicious cyber criminals have just utilized a Canadian college’s system to do a huge cryptojacking effort. Nova Scotia’s St. Francis Xavier University found the assault a week ago and handicapped its system to remove the assault. The programmers allegedly introduced a malware to direct the assault.   In a statement released on Nov. 4, the university...
Continue Reading
Multiple Hacking Campaigns Detected

Multiple Hacking Campaigns Detected Against Telegram and Instagram via BGP Protocol

The malicious hackrs behind the assaults – regardless of whether state-supported or something else – are concentrating solely on subjects of Iran that utilization either the scrambled informing application or picture sharing administration.   As per the Cisco Talos cybersecurity group, the battles have been dynamic since 2017 and are continuous against about 40 million Telegram...
Continue Reading
BitCoins

Necurs Sextortion Movement Sifted Almost US$150,000 in BitCoins

Two new sextortion movements being appropriated by means of the infamous Necurs botnet have as of late been distinguished by threat security specialists. The malicious con artists behind these fraudulent crusades are focusing on exploited individuals whose information has already been spilled.   The con artists guarantee to have trading off recordings of the person in...
Continue Reading
vulnerabilities

New Bluetooth Protocol Chips Plagued by BleedingBit Bug

Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE is...
Continue Reading
MyFitnessPal

Under Armour’s MyFitnessPal Hacked – User Data Exposed

Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients.   MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million foods...
Continue Reading
UAE Cyber Threats

UAE Cyber Threats and How Serious They Are

An aggregate of 276,000 vulnerabilities have been distinguished crosswise over 800,000 web confronting has in the UAE by DarkMatter Group, the provincial digital security consultancy. Its quarterly Cyber Security Report demonstrated that 93 percent of DarkMatter’s appraisals discovered obsolete programming and 83 percent found unsupported programming. The report likewise said that 70 percent of digital occurrence...
Continue Reading
Healthcare industry

42K Clients’ Data Exposed In New Health First Hacking Incident

Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data was...
Continue Reading
cryptocurrency mining malware

CryptoJacking Malware Uses Victims’ Machines to Mine CryptoCurrency

Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine...
Continue Reading
1 2 3 4 5 17