Category

Dark Web

Dark Web page 1

Dark Web criminal sites facing exodus Goodbye Joker Stash

Dark Web criminal sites facing exodus – Goodbye Joker Stash

Recently during our Dark Web monitoring search for cool stuff, we encountered a surprising find regarding Joker Stash in one of the notorious criminal forums where carding actors and websites are gathered plotting their next card victims. Victims of Joker Stash Victims are people who own credit and debit card used for transactions either online...
Continue Reading
7 Million Indian Credit Debit Card Data Leak Dark Web

Credit and debit card data leak of 7 million Indian in the Dark Web

The current trend in the dark web highlighted data leak of almost 7 million Indian cardholders’ sensitive information that has been discovered for public view. Based on different cybersecurity organizations’ testimony on the leaked database, they confirmed that the data is as large as 2 GB and includes PAN numbers sold off in the dark...
Continue Reading
ryuk ransomware data leak K12 Inc Online School compromised data

Online school giant K12 Inc pays Ryuk Ransomware

Current on the list of the victim of the Ryuk ransomware is the K12 Inc. that caters online educational program from kindergarten to grade 12. With the ongoing pandemic, the company is attending now to over a million students that choose to take online classes that they offered rather than be in the conventional way...
Continue Reading
animal jam data breach compromised data dark web

Animal Jam Data Breach

Gaining popularity since 2010, Animal Jam has recently reported a compromised exposure about its 45 million accounts that have been auctioned on the dark web. Its creator, WildWorks, confirmed the breach and already investigating the extent of the data loss.  Animal Jam has been developed targeting kids aged from 4 – 11 years old, offering...
Continue Reading
Vastaamo healthcare ransomware attack malware data breach

Hackers used Data Breach for blackmail of Vastaamo Healthcare firm

A previous hacking incident involving a Finnish healthcare firm, Vastaamo, just became the highlight of another, more sinister ransom campaign in which analysts consider the evilest concept to ever come out of the cybercrime drawing board. It comes as a shock, even for other hacking groups, evaluating how they used all aspects of their attack...
Continue Reading
georgia county ransomware attack malware us election

Georgia County Voters’ Database hit by Ransomware just weeks before election

A most recent ransomware campaign that staggered a Local Georgia county government allegedly impaired a database to confirm voters’ signatures within the verification of absentee ballots. It is the primary detailed case of a ransomware assault influencing an election-related framework within the 2020 cycle. Government authorities and cybersecurity specialists are particularly concerned that ransomware assaults...
Continue Reading
Ubisoft Crytek Egregor Ransomware Malware

New Ransomware Family Egregor attacked Ubisoft and Crytek

Recently, a new ransomware family group called Egregor has reportedly stolen data from Ubisoft and Crytek – two of the largest gaming companies worldwide. These two gaming companies are well known for popular games such as Assassin’s Creed, Far Cry, and Tom Clancy’s video game series. Gaming companies are also one of the main targets...
Continue Reading
lokibot malware cisa advisory antimalware solutions

LokiBot Malware information stealer increase of hostility

Cybersecurity and Infrastructure Security Agency or CISA has recently issued a security advisory notice for US Federal Government organizations and private sectors about increasing LokiBot malware usage cases by threat actors that started in July 2020. EINSTEIN Intrusion Detection System, the in-house security platform CISA uses, has detected continuous malicious activities that can be traced...
Continue Reading
us department of defense vulnerabilities software hardware dod white hat hackers vulnerability assessment

U.S. Department of Defense disclosure on vulnerabilities

A recent disclosure from the U.S. Department of Defense details has been announced to the public. This is about their infrastructure system’s critical and high severity vulnerabilities. The vulnerabilities can allow threat actors to exploit the systems by hijacking a subdomain, remote code execution, or view and capture data and files on a vulnerable machine...
Continue Reading
pioneer kitten iranian hackers compromised data underground forums dark web data breach

Iranian hacking group Pioneer Kitten sells company data on underground forums

Another speculated Iranian government-backed hacker was seen selling stolen corporate network information on an underground hacking forum. The group was named ‘Pioneer Kitten,’ also dubbed as Fox Kitten or Parisite, which is believed as a contracted hacker for Iran. The adversary is estimated to be working under the radar since 2017, exploiting known vulnerabilities on...
Continue Reading
1 2 3 6