Category

Anti Phishing Services
New Mac Malware Can Capture Invisible Data and More
Yet another Macintosh malware named OSX. SearchAwesome was just discovered active and thriving. The malware can perform different malevolent exercises, for example, blocking scrambled web activity to infuse advertisements. The Adware acts like a real application and introduces a digital certificate, which influences the genuine mitmproxy open-source program. This, thus, can be utilized by assailants...
Continue Reading
The Usual Black Friday
What will you do this Black Friday? Me? I’m super energized, I’ll be… It’ll be extraordinary in light of the fact that… … Goodness I can’t lie. Like many individuals who work in IT I’ll be stowing away under my work area, trusting that everything will pass and endeavoring to fight off every one of...
Continue Reading
Chinese Malware Returns with a Vengeance
In 2013, InfoSec firm Mandiant released a blockbuster security report covering a state-supported hacking group known as APT1, or Comment Crew. The Chinese hackers accomplished a lasting infamy, attached to the effective hacks of in excess of 100 US organizations and the exfiltration of several terabytes of information. In particular, analysts have discovered a malware...
Continue Reading
Hetzner Suffers Yet Another Data Breach
South African subsidiary of Germany’s Hetzner Online, has advised customers that it has been a victim of a “data breach” which likely exposed all of their customers data. The data breach, according to Hetzner, was uncovered by their cyber security research team on October 5th 2018 when they apparently noticed an “unusual network activity.” The...
Continue Reading
Hackers Found Selling Pakistani Bank Data on the Dark Web
Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
GhostDNS
A cyberattack likened to a DNS-changer infiltration was first spotted in August on several D-Link routers in Brazil has expanded to affect more than 80 different network devices and more than 100,000 individual kits. Radware first identified the latest campaign, which started as an attack on Banco de Brasil customers via a DNS redirection that...
Continue Reading
tech support scam
Previously we have discussed here in iZOOblogs about the modus and dangers of tech support scams: https://www.izoologic.com/2018/06/27/alarming-increase-tech-support-scams/ These old scams have proven themselves to be prevalent, because according to a reliable source in a contact center of a software security company they get a lot of contact regarding these scams where they thought initially to...
Continue Reading
URL Spoofing on Safari Browsers
An IT security researcher based in Pakistan named Rafay Baloch has just uncovered a critical weakness that could allow fraudsters to spoof website addresses in the Microsoft Edge web browser for Windows and Apple Safari for iOS. While Microsoft secured this weakness last month as part of its monthly security updates release, Safari is still...
Continue Reading
Credit Card Info
It appears that MageCart strikes again, but this time the target was a popular electronics retails store online which is Newegg. MageCart previously was behind the breach of British Airlines and Feedify. It was reported that MageCart has been stealing payment information from credit cards for over a month since it was injected according to...
Continue Reading
1 2 3 4 5 6