Category

Brand Abuse

Brand Abuse page 1

pioneer kitten iranian hackers compromised data underground forums dark web data breach

Iranian hacking group Pioneer Kitten sells company data on underground forums

Another speculated Iranian government-backed hacker was seen selling stolen corporate network information on an underground hacking forum. The group was named ‘Pioneer Kitten,’ also dubbed as Fox Kitten or Parisite, which is believed as a contracted hacker for Iran. The adversary is estimated to be working under the radar since 2017, exploiting known vulnerabilities on...
Continue Reading
ripple20 malware iot device industry internet of things antimalware hardware vulnerabilities

Ripple20 Malware highlights IoT Industry challenges

With the growing statistics and people being reliant on technology and devices connected through the internet, a new dreaded threat has been released for awareness of the public. Consist of 19 zero-day attack vulnerabilities for low-level TCP/IP software library that has been used to millions of devices manufactured, the report was collaboratively named ‘Ripple20’. Exploiting...
Continue Reading
sk hynix maze ransomware attack antimalware malware solutions monitoring dark web

Maze hacked memory chips company SK Hynix

The infamous maze hacker has done it again, gaining another popularity for victimizing SK Hynix from South Korea. The victim company was known to be the third-largest semiconductor company profiting from manufacturing RAM and flash memory that is distributed around the globe. A prominent company that they do business is Apple and other PC manufacturers....
Continue Reading
iranian hackers apt charming kitten impersonation social engineering

Iranian APT group Charming Kitten impersonates journalists

After few months working under the radar, cybersecurity experts again have unraveled the repurposed modus of the Iranian APT group dubbed as Charming Kitten. Their main targets are usually to perform cyber espionage to victims from the United States, Israel, and other countries who typically are prominent people from being an activist, entrepreneurs, government, and...
Continue Reading
twitter hackers arrested social media monitoring phishing anti phishing spear-phishing attack

Twitter Hackers now in custody

With the sensationalized successful hacking with Twitter recently, the US Department of Justice, and other Law Enforcement Authority, did not waste time to uncover the identity of the hackers. Due to the enforcers’ intensified effort, they were able to track down these adversaries behind the attack and able press charges for their committed crime. According...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
amazon phishing vishing attacks

Amazon credential Phishing and Vishing attacks are on the move

Amazon is an eCommerce company that currently has ‎US$14.541 billion in operating income in 2019. This eCommerce giant has been one of the go-to shopping platforms of people now more than ever because of lockdown implementation caused by COVID-19. As many are ordering their stuff online as it’s safer than leaving the house excessively, Amazon...
Continue Reading
zoom vulnerability vanity URL flaw exploit

Vanity URL: Newly discovered Zoom vulnerability

A cybersecurity researcher has recently discovered a flaw in Zoom conferencing software. The newly discovered Zoom vulnerability is relatively minor but it is easy to exploit the flaw. This flaw can allow mimicking an Organization and would trick employees divulging their personal and confidential information by using Social Engineering. As we all know, Zoom’s popularity...
Continue Reading
twitter high profile account hijacked cryptocurrency scam social engineering

High Profile Twitter accounts hijacked to promote Cryptocurrency Scam

Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common...
Continue Reading
retirement system san francisco data breach

Data Breach of a retirement system in San Francisco

Cybercrime experts recently reported that the breach of the San Francisco Employees Retirement System that leaked out sensitive information of registered active and retired employees for their retirement program. An in-depth report concluded that the leakage came through after unauthorized access was gained on the test environment created by the contracted developer for their website....
Continue Reading
1 2 3