Blog

Phishing Modus Using WhatsApp

Phishing Modus Using WhatsApp: An alternative to Email Campaigns

What is up with the app? Cybercriminals who take advantage of people through social engineering techniques are now prowling within WhatsApp. Noticeably these threat actors are largely targeting Middle Eastern countries using company logos, and preset messages to lure victims in giving out crucial information. What are the styles of messages? From fake lottery winners up...
Continue Reading
Phishing Blackmail Campaign

New Phishing Blackmail Campaign

Cyber Security analysts have seen an ongoing switch in strategies by malicious threat actors’ resolved to leading shakedown activities. The essentially terrifying strategy in these phishing activities is to tell the beneficiary the blackmailer has humiliating or harming proof against the objective with an interest to pay a set sum all together for the pernicious on-screen...
Continue Reading
Hackers Hide Crypto-Jackers in Windows Installation Files

Hackers Hide Crypto-Jackers in Windows Installation Files

Crypto-jacking plans are getting more complicated continuously. It shows up programmers are currently masking digital money mining malware and passing it off as authentic Windows establishment bundles.   Analysts say the vindictive programming, all the more normally known as Coinminer, was particularly intended to fly under the radar. What makes the assault especially hard to identify...
Continue Reading
Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

Intel CPUs Hyperthreading Weakpoint Steals Crypto Keys

PortSmash is the second processor assault that objectives hyperthreading. TLBleed unveiled in June likewise utilized hyperthreading to decide a private encryption key. The specialists building up that assault ran a program figuring cryptographic marks utilizing the Curve 25519 EdDSA calculation executed in libgcrypt on one coherent center and their assault program on the other sensible center....
Continue Reading
HSBC USA Hacked

HSBC USA Hacked – User Data Compromised

HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018.   What was the...
Continue Reading
Stuxnet malware

Iran Got Hit by Powerful StuxNet 2.0 Malware

Iranian systems were as of late allegedly hit by another all the more ground-breaking variation of the notorious Stuxnet malware. The new Stuxnet variation is purportedly more forceful and modern. The malware was first found eight years prior when it focused on Iran’s atomic frameworks.   The Stuxnet virus was uncovered some eight years ago, and...
Continue Reading
IronChat Cracked by Law Enforcement Revealing

IronChat Cracked by Law Enforcement Revealing Almost 300K Messages from Suspected Criminals

Dutch police have uncovered that they could keep an eye on the interchanges of in-excess of 100 presumed crooks, observing live as over a fourth of a million chat messages were traded. The scrambled messages were sent utilizing IronChat, an apparently secure encoded messaging administration accessible on BlackBox IronPhones.   The site of Blackbox Security used...
Continue Reading
email phishing scams

Dubai’s Biggest Bank Falls Victim to Tax Refund Phishing Scam

Dubai’s largest bank has cautioned clients to be careful with another phishing email trick which professes to offer VAT discounts. Emirates NBD cautioned that an email with the headline VAT Refund Notification, professing to be from the bank, ought not to be opened.   “We ask you to be very watchful and dependably check the source...
Continue Reading
Default Cisco Admin Account Exposes Switches to Remote Attacks

Default Cisco Admin Account Exposes Switches to Remote Attacks

A default account present in Cisco Small Business switches can enable remote assailants to increase finish access to defenseless gadgets. The systems administration goliath presently can’t seem to discharge patches, yet a workaround is accessible. As indicated by Cisco, Small Business switches running any product discharge accompany a default account that is accommodated the underlying login....
Continue Reading
Elon Musk CryptoJackers Hijack Legit Accounts

Elon Musk CryptoJackers Hijack Legit Accounts

Tricksters are back on Twitter imitating their most loved big name, Elon Musk, in an offer to persuade individuals to put resources into their imposter Bitcoin plot.   This time, the plan brings up difficult issues over the fact that it is so natural to seize and modify confirmed records on the informal organization. For this...
Continue Reading
AI Weapon against Cyber Attacks on The Dark Web

DARKMENTION: AI Weapon against Cyber Attacks on The Dark Web

Cybersecurity is one of the essential worries of web clients these days, which incorporates business and legislative associations too. Later, vast scale information ruptures at Gmail, Equifax, Facebook, Google+ Cathay Pacific Airways, and Yahoo, and so on. Have clarified that the greater the association, the higher would be the cybersecurity danger. The job of Dark Web...
Continue Reading
Cyber Hackers Attacked Irish Citizens with Email Fraud

Cyber Hackers Attacked Irish Citizens with Email Fraud

Digital offenders are focusing on Irish clients as a major aspect of a worldwide email coercion battle, a main digital security organization has cautioned. SkOUT Secure Knowledge, which gives digital security innovation and answers for organizations, associations and SMEs and has its EMEA central command in Portlaoise, has detailed a sharp increment in the quantity of...
Continue Reading
Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019.   “The threat landscape is undoubtedly evolving;...
Continue Reading
DanaBot Banking Trojan Found Targeting European Countries

DanaBot Banking Trojan Found Targeting European Countries

Security specialists from ESET unravel banking trojan named DanaBot being dispersed to European nations by means of spam messages. DanaBot is prominent for its multistage disease chain and secluded design. Earlier research from Trustwave, alongside ESET’s new research, recognizes DanaBot as containing a few segments — generally as powerful connection libraries (DLL) — that perform separate...
Continue Reading
Smoke Loader Malware just got heavier with PROPagate Injection

Smoke Loader Malware just got heavier with PROPagate Injection

A malicious downloader malware called Smoke Loader, which sporadically infected victims since 2011, has gotten active this year with a new method to spread the infection to Windows users. Like most malware, it tricks the victim into downloading a sketchy Microsoft Word document from a spam invoice email with unknown sender, and then prompts the user...
Continue Reading
technical support scams

Tech Support Scams Part 2: Freezing Chrome Browser to Panic Victims

We’ve tackled about fake tech support helpers in the past, pretending to fix PCs in exchange for either a fee or a victim’s credit card information. Now a certain exploit that Google Chrome already fixed last February has resurfaced – scammers trying to scare victims by making their browsers unresponsive. These scammers abuse a particular browser...
Continue Reading
Popular Browser Extension "Stylish" Discovered Stealing Your Browser Data

Popular Browser Extension “Stylish” Discovered Stealing Your Browser Data

Both Google Chrome and Mozilla Firefox issued a permanent ban against the browser add-on “Stylish”, after Robert Heaton, a software engineer, accidentally found out that it covertly records browser data and sends them to questionable remote servers. Stylish is an add-on that allows users to personalize any website they visit. From changing color scheme to its...
Continue Reading
Social Engineering: Cyber Love gone Phishing Intel

Social Engineering: Cyber Love gone Phishing Intel

Most users nowadays are still not aware that Social Engineering is dangerous and rampant as ever. It is a technique still being utilized by cyber criminals and intelligence agents. Yes, that’s right Intelligence Officers are trained to be good at it in order to phish for information. In this digital age, the medium of communication has...
Continue Reading
The Rotexy Trojan: banker and blocker

The Rotexy Trojan: banker and blocker

On the back of a flood in Trojan movement, a standout amongst the most fascinating and dynamic examples to date was a mobile Trojan from the Rotexy family. In a three-month time span from August to October 2018, it propelled more than 70,000 assaults against clients found basically in Russia.   An intriguing component of this...
Continue Reading
data breach cost

What will a data breach cost you?

With our developing reliance on innovation, huge data breaches are more typical than any time in recent history. Between January 2005 and today, there have been more than 9000 breaks with more than 1.1 billion records uncovered, as per the ID Theft Resource Center. The biggest information breach in history was a hack on 500 million...
Continue Reading
1 3 4 5 6 7 17