Category

Anti Phishing Services
PDF attacks
Email users are mindful on how attackers used phishing and spear-phishing campaigns and how this medium is being the source of these attacks as with most email attachments or links, PDF files have gotten a lot of attention from threat actors.   Code Execution   Our familiarity with the possibility of malicious Office attachments that...
Continue Reading
Social Media
“Weaponization” of Social Media How are we able to confidently say that the Social media is weaponized? From stalking, petty crimes, going up to wars and even elections. Social Media alone is a giant tactical weapon of the new cyber tacticians that seek out advantage from the digital information era. According to New York Times...
Continue Reading
WordPress Vulnerability
What is the issue? Unauthenticated RCE Vulnerability Remote code execution to access one’s device through a vulnerability is not a new thing, however still one of the ways for hackers to take advantage and make use of another site’s resources to execute malicious actions nonetheless. Without authentication a hacker can take control of a wordpress...
Continue Reading
phishing Attacks
Another phishing campaign called ” Beyond the Grave” targeted international hedge funds on January 9th, 2019. In an announcement presented on Bleeping Computer, the attackers have expressed that they will keep on targeting banking and financial institutions in the future. A part named Xander Bauer has made a post in the Bleeping Computer forums with...
Continue Reading
Radisson Hotel Group Hacked
The Radisson Hotel Group is informing individuals from its Loyalty Scheme about an information rupture that may have brought about the unknowingly illegal presentation of their sensitive personal information. The illegally exposed data incorporates names, physical locations, email addresses, telephone numbers, Radisson Reward numbers and frequent flyer numbers and information of the individuals/members. The malicious...
Continue Reading
Spyware and Malware protection
Falling victim to online fraud Numerous online opportunists rely on deception in order to fulfill their crimes. Those committing online fraud scams are getting considerably more innovative in imitating legitimate businesses to get your information. Phishing emails trying to persuade you to give personal information are the most common. Different impersonators attempt to motivate you...
Continue Reading
phishing assaults
November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From...
Continue Reading
Zoho Domain Taken Down By Mistake
The domain of India-based software provider Zoho, one of the largest tech companies in the world, was taken offline today for around two hours after the domain registrar overstepped its attributes and took Zoho.com down following a banale phishing complaint. The downtime resulted in nearly 30 million Zoho users being unable to access Zoho’s website,...
Continue Reading
Adult Website Hacking Leaks
The database housing an erotica site known as “Wife Lovers” has been hacked, grabbing client data secured just by an easy to-split, obsolete hashing method known as the DEScrypt calculation.   Throughout the end of the week, it became visible that Wife Lovers and seven sister websites, all comparably focused to a particular grown-up intrigue...
Continue Reading
Emotet Returns with Thanksgiving Theme and Better Phishing Tricks
 After a short break, Emotet malware has been watched covered in reports conveyed through messages that pretended to be from financial institutions or masked as Thanksgiving-themed greetings for employees. Toward the beginning of October, Emotet movement dropped off the radar, just to return towards the month’s end with new plugin that exfiltrates email subjects and...
Continue Reading
1 2 3 4 6