Category

Anti Phishing Services
phishing assaults
November is the main month of the busiest shopping period of the year. Everything starts on 11.11, also called Singles’ Day in China, which has since transformed into one of the biggest on the web (and disconnected) shopping days on the planet, Immediately pursued by Black Friday, which falls on November 23rd this year. From...
Continue Reading
Zoho Domain Taken Down By Mistake
The domain of India-based software provider Zoho, one of the largest tech companies in the world, was taken offline today for around two hours after the domain registrar overstepped its attributes and took Zoho.com down following a banale phishing complaint. The downtime resulted in nearly 30 million Zoho users being unable to access Zoho’s website,...
Continue Reading
Adult Website Hacking Leaks
The database housing an erotica site known as “Wife Lovers” has been hacked, grabbing client data secured just by an easy to-split, obsolete hashing method known as the DEScrypt calculation.   Throughout the end of the week, it became visible that Wife Lovers and seven sister websites, all comparably focused to a particular grown-up intrigue...
Continue Reading
Emotet Returns with Thanksgiving Theme and Better Phishing Tricks
 After a short break, Emotet malware has been watched covered in reports conveyed through messages that pretended to be from financial institutions or masked as Thanksgiving-themed greetings for employees. Toward the beginning of October, Emotet movement dropped off the radar, just to return towards the month’s end with new plugin that exfiltrates email subjects and...
Continue Reading
New Mac Malware Can Capture Invisible Data and More
Yet another Macintosh malware named OSX. SearchAwesome was just discovered active and thriving. The malware can perform different malevolent exercises, for example, blocking scrambled web activity to infuse advertisements. The Adware acts like a real application and introduces a digital certificate, which influences the genuine mitmproxy open-source program. This, thus, can be utilized by assailants...
Continue Reading
The Usual Black Friday
What will you do this Black Friday? Me? I’m super energized, I’ll be… It’ll be extraordinary in light of the fact that… … Goodness I can’t lie. Like many individuals who work in IT I’ll be stowing away under my work area, trusting that everything will pass and endeavoring to fight off every one of...
Continue Reading
Chinese Malware Returns with a Vengeance
In 2013, InfoSec firm Mandiant released a blockbuster security report covering a state-supported hacking group known as APT1, or Comment Crew. The Chinese hackers accomplished a lasting infamy, attached to the effective hacks of in excess of 100 US organizations and the exfiltration of several terabytes of information. In particular, analysts have discovered a malware...
Continue Reading
Hetzner Suffers Yet Another Data Breach
South African subsidiary of Germany’s Hetzner Online, has advised customers that it has been a victim of a “data breach” which likely exposed all of their customers data. The data breach, according to Hetzner, was uncovered by their cyber security research team on October 5th 2018 when they apparently noticed an “unusual network activity.” The...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web
Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
1 2 3 4 5