Blog

vulnerabilities

New Bluetooth Protocol Chips Plagued by BleedingBit Bug

Two new zero-day vulnerabilities were found in Bluetooth Low-Energy (BLE) chips, which could uncover numerous endeavor firms from around the globe to remote code execution assaults. The arrangement of vulnerabilities were named as “Bleedingbit“. By abusing the bugs, an aggressor could possibly focus on a helpless framework found 100 to 300 feet away.   BLE is...
Continue Reading
MyFitnessPal

Under Armour’s MyFitnessPal Hacked – User Data Exposed

Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients.   MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million foods...
Continue Reading
UAE Cyber Threats

UAE Cyber Threats and How Serious They Are

An aggregate of 276,000 vulnerabilities have been distinguished crosswise over 800,000 web confronting has in the UAE by DarkMatter Group, the provincial digital security consultancy. Its quarterly Cyber Security Report demonstrated that 93 percent of DarkMatter’s appraisals discovered obsolete programming and 83 percent found unsupported programming. The report likewise said that 70 percent of digital occurrence...
Continue Reading
Healthcare industry

42K Clients’ Data Exposed In New Health First Hacking Incident

Health First just uncovered an information rupture that influenced its online application seller. It may have traded off the individual information of around 42,000 clients. The firm guaranteed that the information broke incorporated clients’ Social Security Numbers, locations and dates of birth.   In any case, the social insurance association asserts that no therapeutic data was...
Continue Reading
cryptocurrency mining malware

CryptoJacking Malware Uses Victims’ Machines to Mine CryptoCurrency

Cyber Security researchers have just discovered a new Russian malware, dubbed WebCobra, which harnesses victims’ computing power to mine for cryptocurrencies.   Coin mining malware is difficult to detect. Once a machine is compromised, a malicious app runs silently in the background with just one sign: performance degradation. As the malware increases power consumption, the machine...
Continue Reading
DarkHotel

DarkHotel: NoKor Hacking Elite Targeting IE Scripting Engine

The stealthy North Korean APT group dubbed DarkHotel, otherwise known as APT-C-06, Fallout Team, SIG25, and so on, has been progressively focusing on Internet Explorer (IE) scripting motor. Security specialists as of late found that DarkHotel made new endeavors for two more seasoned vulnerabilities influencing the Internet Explorer scripting motors.   Despite the fact that DarkHotel’s...
Continue Reading
BotNet

New BotNet Army Slowly Spreading Mayhem On The Net

Security specialists have revealed the noxious exercises of another botnet named BCMUPnP_Hunter. It has just subjugated around 100,000 switches and has been unobtrusively becoming in the course of recent months. The botnet is being utilized to convey enormous email crusades and endeavors to interface with webmail administrations.   The botnet’s administrators were spotted utilizing a five-year-old...
Continue Reading
Routers Botnet

100K SoHo Routers Taken Over by A Botnet

A recently found botnet has taken control of an eye-popping 100,000 home and little office switches produced by a range of well-known industry manufacturers, for the most part by misusing a basic weakpoint that has stayed unaddressed on tainted gadgets over five years after it became exposed.   Scientists, who detailed the mass contamination before the...
Continue Reading
Hospital Data Breach

Huntsville Hospital Data Breach

Huntsville Hospital in Alabama is informing work candidates about a data rupture that may have brought about the bargain of their own information. The data rupture happened in May 2018 yet the doctor’s facility came to think about it just in October 2018.   As indicated by the notice letters conveyed by the healing center, the...
Continue Reading
Banking Malware

Metamorfo Banking Malware Attacking Users In Brazil

Two new Metamorfo malspam battles have been spotted by security specialists. The battles have been pushing keeping money malware variations that are fit for taking certifications and card installment information. These battles are particularly focusing on clients of money related foundations in Brazil. As per the security specialists, who found the new assault incidents, the cybercriminals...
Continue Reading
Google Play

Malicious App Sneaking Around Google Play For A Year

A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group.   At the season of disclosure, the pernicious...
Continue Reading
Online Dating

Hackers Found Selling Online Dating Profiles for a Measly US$153

In May 2017, Moll and Tactical Tech obtained one million dating profiles from the information representative site USDate, for around $153. USDate asserts on its site that the profiles it’s offering are authentic and that the profiles were made and have a place with genuine individuals effectively dating today and searching for accomplices.   In 2012,...
Continue Reading
Banking malware detection

Lokibot: The Banking Trojan that hacked a hacker, now comes with the list of targeted banks

Last December we discussed a written article about a hacker getting hacked by a banking Trojan. The banking malware was identified as the Lokibot which was exploited by being used by different cybercriminals. The details are in the previous article https://www.izoologic.com/2018/12/27/hacker-just-got-hacked/ Can you fathom how critical it is when a hacker itself gets hacked? Now how...
Continue Reading
Malware Attack protection on The Pakistani Military

Operation Shaheen: Malware Attack on The Pakistani Military

The Pakistan Air Force is the evident focus of a complex new state-supported assault campaign. Security house Cylance said for this present week a state-supported gathering – named the White Company by scientists – has been hoping to get into the systems of the Pakistani military in a long haul focused on assault battle known as...
Continue Reading
crypto exchanges

NoKor Hacked Crypto Exchanges to Fund Regime

As per cybersecurity firm Inksit Group, state-financed programmers in North Korea have been focusing on crypto trades in South Korea to go around different authorizations forced on the routine.   The security firm affirmed the legislature of North Korea of running illegal introductory coin offering (ICO) extends and breaking into substantial crypto trades.   “We found...
Continue Reading
Vishing Scam

Swindling Thru Deception : The New Vishing Scam

Vishing, or voice phishing, is a phishing assault where fraudsters utilize the phone to distort their alliance or specialist with the expectation that unfortunate casualties will uncover qualifications or other individual data for further trade off. Regularly, vishing on-screen characters get the individual data of the person in question, including their telephone number, and start a...
Continue Reading
Website Malware protection

265 Researchers Take Down 100,000 Malware Distribution Websites

Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded a...
Continue Reading
Domain Monitoring

DHS issues security alert about recent DNS hijacking attacks

DHS spreads out four-advance activity plan for researching DNS hacks and securing DNS management accounts.   The US Department of Homeland Security (DHS) has distributed today an ” emergency directive” that contains guidance with respect to an ongoing report detailing a wave of DNS hijacking incidents perpetrated by Iran.   The emergency directive [1, 2] orders...
Continue Reading
Cameras

New Security Script Allows Insecure Cameras to be searched by IP Address

There’s no closure to the security bad dream that is the Internet of Things (IoT). Another apparatus created by a security scientist gives you a chance to seek uncertain reconnaissance cameras by essentially entering a location.   Named Kamerka, the apparatus consolidates information of cameras that are associated with the web with area information to make...
Continue Reading
Radisson Hotel Group Hacked

Radisson Hotel Group Hacked!

The Radisson Hotel Group is informing individuals from its Loyalty Scheme about an information rupture that may have brought about the unknowingly illegal presentation of their sensitive personal information. The illegally exposed data incorporates names, physical locations, email addresses, telephone numbers, Radisson Reward numbers and frequent flyer numbers and information of the individuals/members. The malicious hacking...
Continue Reading
1 2 3 4 5 6 17