Category

Cyber Security
Hackers Found Selling Pakistani Bank Data on the Dark Web
Malicious threat actors have apparently figured out how to take assets from almost every bank in Pakistan, in a stunning unforeseen development. The gigantic money related break was affirmed by the executive of cybercrimes at Pakistan’s Federal Investigation Agency, wing Captain (retd) Mohammad Shoaib, various nearby news outlets detailed. The hackers have allegedly figured out...
Continue Reading
American Express Data Breach Exposed 700K User Info
Around 700,000 clients of American Express India’s information were left uncovered in an unbound database. The unintentional information spill was caused by a MongoDB server that was left uncovered with no secret phrase security. The unbound database contained 689,272 records in plaintext and available to anybody on the web. As per Bob Diachenko, Chief of...
Continue Reading
USB Type C – A Hackers Gateway
Plugging in the power — or at least what you think is power — to a USB-C powered laptop can connect your computer, and the valuable personal data on it, directly to hackers. Your personal financial information, passwords and documents stored on the laptop could help a cyber-criminal steal your identity. The laptop may even...
Continue Reading
anti spyware malware
A German-based spyware organization named Wolf Intelligence coincidentally uncovered its very own corporate information, including observation targets’ data, travel paper outputs of its organizer and family, accounts of gatherings and that’s just the beginning. The accidental leak uncovered around 20 GB of the organization’s information, which was left unprotected in a command and control server...
Continue Reading
Security Weakpoint Impacts Multiple Linux and BSD Distros
All Linux and BSD variations that use the X.Org server bundle contain a powerlessness, security scientists as of late unveiled. This blemish could enable an assailant with restricted benefits to raise benefits and gain root framework get to, either utilizing a terminal or SSH session. Commonly, if a powerless variant of X.Org keeps running on...
Continue Reading
Saudi PetroChem Plant Hacking Blamed On Russians
Another investigation of the pernicious PC code utilized in a messed up assault on a Saudi petrochemical plant reasons that a great part of the exertion was composed from inside a state-claimed Russian logical establishment, a standout amongst the most immediate connections between authority Russian programmers and an unfriendly interruption on a noteworthy bit of...
Continue Reading
Online Love Scam Syndicate Busted
A syndicate associated with nearly $20 million worth of Internet love tricks has been disabled in a joint global activity including officers from Singapore, Malaysia and Hong Kong. Eight Internet love trick cases detailed in Singapore, including in any event, around $450,000, were solved because of the joint task. The task was done in Malaysia...
Continue Reading
GDPR on ICANN Affects Cybercrime Forensic Mitigation and Investigation
Last 2017 the world was fazed by USA’s controversial issues and decision on Net Neutrality in which he tried to analyze how it would affect cyber security as it involves laws and processes in which we have discussed on https://www.izoologic.com/2017/12/22/net-neutrality-contributes-secured-internet/ The good thing is it did not much globally affect the security of the cyber...
Continue Reading
Hackers Prefer Tuesdays When Deploying Phishing Attacks
Malicious cyber attackers steal user credentials by tricking unsuspecting users into using their login information on engineered fake websites. By hijacking an existing login page or creating an accurately similar login website that you can’t tell it apart from the authentic site, attackers easily gain access to the target network. Organized phishing operations, in which...
Continue Reading
Hackers Stole $15Million from Cosmos Bank
Police in India have launched a formal investigation of a malware attack on a Cosmos Bank ATM server that enabled attackers to siphon off US$13.4 million. The hackers cloned the bank’s Visa and Rupay debit cards and used them to siphon cash from ATMs on Aug. 11 and Aug. 13, according to the bank. An investigation...
Continue Reading
1 2 3 4

Categories