Blog

Android malware

New Android Malware Gustuff Targeting 100+ Banking, 32 Cryptocurrency and Messengers apps such as WhatsApp

A newly found type of Android malware has stolen cryptocurrency and banking data from in excess of 125 different applications. The “Gustuff” Trojan virus is said to pick up its popularity in the cybercriminal underworld given that it’s custom-made explicitly to take banking and crypto assets. Gustuff is accepted to be about a year old but...
Continue Reading
hacking

Asus was warned of hacking risks months ago, thanks to leaky passwords

A security researcher cautioned Asus two months back that workers were inappropriately distributing passwords in their GitHub stores that could be exploited to get to the organization’s corporate network. One password, found in an employee repo on the code sharing, enabled the researcher to get to an email account used by internal developers and engineers share...
Continue Reading
Magento PayPal

Hackers abuse Magento PayPal integration to test validity of stolen credit cards

Hacker groups and online fraudsters are mishandling a component of Magento online shops to test the validity of stolen debit and credit card numbers. The transactions are executed against Magento stores that support the PayPal Payflow Pro integration. The PayPal Payflow Pro integration is a payment option available on Magento shops that enables an online store...
Continue Reading
PDF attacks

Malicious PDFs | Revealing the Techniques Behind the Attacks

Email users are mindful on how attackers used phishing and spear-phishing campaigns and how this medium is being the source of these attacks as with most email attachments or links, PDF files have gotten a lot of attention from threat actors.   Code Execution   Our familiarity with the possibility of malicious Office attachments that run...
Continue Reading
Android apps

Preinstalled Android apps are harvesting and sharing your data

Our Mobile Application Monitoring team has been wary of the trend that mobile appstores including iTunes and Google Playstore has been getting malicious apps in their store. Now the deception of mobile apps continue, up to the point that it has reached the stage where it has been pre-installed by your Mobile Phone vendor. Classy move...
Continue Reading
Social Media

Era of Fake News Round 2: The Era where Information is being weaponized

“Weaponization” of Social Media How are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone is a giant tactical weapon of the new cyber tacticians that seek out advantage from the digital information era. According to New York Times article...
Continue Reading
Ransomware

Ransomware Strikes(Again): Lockergoga Series

Risks when an operation gets disrupted How much does it affect a business no matter what size whenever its operations get disrupted? Huge sums of money, time, effort, and most of all the data that are involved in the operations of the business.  Consumer confidence? A plunge in the stakeholders confidence? How dangerous? Ransomware in general...
Continue Reading
Facebook in plain text format

Facebook in plain text format: An internal Mistake, View able within the Organization are hundreds of Millions of Passwords

Another one? It is as if the Cambridge Analytica, and the previous Facebook bug or vulnerability was not enough of a problem for the Social Media giant. Facebook now faces another controversy where it had exposed its latest security breach. What was the security breach? Who were affected? The security breach where the platform accidentally stored...
Continue Reading
dark web sales

Hack-A-Ton Leak-a-Ton Final Round? The fourth round of dark web sales

The latest round of leaked data sold by a famous dark web netizen was noticed by The Hacker News, who already made three separate releases in different time intervals of leaked data for sale in a Dark web Marketplace. The discovery? While the dark web monitoring mode is consistent, with the large hidden services and contents...
Continue Reading
WordPress Vulnerability

Hackers Take Advantage of WordPress Vulnerability: Hacks Sites Remotely Unauthenticated, Undiscussed Effects of the Cause

What is the issue? Unauthenticated RCE Vulnerability Remote code execution to access one’s device through a vulnerability is not a new thing, however still one of the ways for hackers to take advantage and make use of another site’s resources to execute malicious actions nonetheless. Without authentication a hacker can take control of a wordpress site...
Continue Reading
Iranian Hackers Stormed Citrix

Iranian Hackers Stormed Citrix, Got Away with Terabytes of Data, Including Internal Secrets

Citrix has now disclosed a massive data leak by informing their customers that hackers intruded their network and stole their corporate secrets.   Affected Customers Citrix services the following businesses but not limited to: US Military Various US Government Agencies Whitehouse FBI With the above government entities itself, this data leak proves to be critical. A...
Continue Reading
Hackers Breached Australian Defense Contractor

Hackers Breached Australian Defense Contractor

One of Australia’s major defense service providers and shipbuilders – Austal was hit by an information rupture on November 1st, 2018. The malicious cyber criminals figured out how to take the ultra-touchy information of a couple of the company’s staff. In any case, the firm cases that there is no proof of burglary of national security...
Continue Reading
Office 365 phishing scam

Office 365 Phishing Strategy Tricks Users With Live Chat Support

Phishing attacks have now progressed toward becoming something of a day by day event for some. However, the motivation behind why these noxious attacks stay abundant lies in their resourcefulness. In time, we know about a clever phishing method that includes technical support as well. We are talking about an Office 365 phishing campaign that scams...
Continue Reading
Gate.io Bitcoin Transactions Breached by Hacking StatCounter

Gate.io Bitcoin Transactions Breached by Hacking StatCounter

Malicious Hackers have broken StatCounter, one of the web’s biggest web investigation stages, and have embedded pernicious code inside the organization’s principle website following content. As per Matthieu Faou, the ESET malware specialist who found the hack, this pernicious code seizes any Bitcoin exchanges made through the web interface of the Gate.io digital currency trade. “We...
Continue Reading
phishing Attacks

Phisher Announces More Attacks Against Hedge Funds and Financial Firms

Another phishing campaign called ” Beyond the Grave” targeted international hedge funds on January 9th, 2019. In an announcement presented on Bleeping Computer, the attackers have expressed that they will keep on targeting banking and financial institutions in the future. A part named Xander Bauer has made a post in the Bleeping Computer forums with a...
Continue Reading
DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI Drone Data Exposed due to Cloud Infrastructure Vulnerability

DJI makes some of the most mainstream quadcopters available, yet its items have more than once drawn investigation from the United States government over protection and security concerns. Most as of late, the Department of Defense in May restricted the buy of customer rambles made by a bunch of merchants, including DJI. Presently DJI has fixed...
Continue Reading
GPU Channel

GPU Channel Attacks Pave Way for Data Theft

PC researchers at the University of California, Riverside have uncovered out of the blue how effectively assailants can utilize a PC’s illustrations handling unit, or GPU, to keep an eye on web movement, take passwords, and break into cloud-based applications. Marlan and Rosemary Bourns College of Engineering software engineering doctoral understudy Hoda Naghibijouybari and post-doctoral specialist...
Continue Reading
identity fraud and identity theft protection

When Aaadhaar leaks are real despite denial: This time an LPG Company did it

What is new? This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot hack...
Continue Reading
Evernote for Windows

Evernote Flaw Allowed Hackers to Create XSS Vulnerability and Steal Data

A researcher who uses the online moniker Sebao identified a stored XSS flaw in the Evernote app. He found that when a picture was added to a note and later renamed, JavaScript code could be added instead of a name. If the note was shared with another Evernote user, the code would get executed when the...
Continue Reading
Artificial Intelligence

How Artificial Intelligence Will Become Weaponized in Cyber Attacks

On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement through...
Continue Reading
1 3 4 5 6 7 19