This year has been challenging for businesses, especially with the pandemic outbreak. Several threat actors have taken advantage of executing cyberattacks against organizations worldwide, ransomware being the most common type. System of government such as the Commonwealth of Independent States (CIS) also failed to avoid such unfortunate occurrences of attacks for this year. Businesses that operate inside the CIS have been the targets of non-prevalent ransomware threat groups. Described below is...Continue Reading
A publication was released by Google recently regarding the company’s plans of increasing user account security. This plan includes an aim to auto-enroll 150 million Google users into a two-step verification or 2SV process by the end of 2021 and oblige more than 2 million YouTube creators to activate the 2SV. To improve user account security, Google takes a new step and fosters its existing measures such...Continue Reading
Neiman Marcus, an American luxury department store chain in the ownership of Neiman Marcus Group (NMG) located in Dallas, Texas, has warned millions of their worldwide clients about their online accounts being susceptible to a major data breach. The impacted customers have reached over 4.6 million people, of which they have sent notifications regarding the attack that may have begun by May last year. From the...Continue Reading
One of Europe’s largest customer care and call centre providers, GSS, has undergone a devastating ransomware attack resulting in a massive freeze in its IT systems and has halted call centre services across its Spanish-speaking customer base. GSS is also a Spanish and Latin America division of the Covisian firm. This week, many call centres and...Continue Reading
REvil, a private ransomware-as-a-service (RaaS) group from Russia, has reportedly come back to its operations intending to cheat on its affiliates. According to reports made by security researchers, the ransomware gang cheats on its partners so they will be able to rob all ransom payments from their victims. The operators of the REvil RaaS were...Continue Reading
Microsoft reported a newly found Phishing-as-a-Service operation last Tuesday, which has used a high-volume 300,000 distinct and newly created subdomains that are operated in a single run. According to the tech giant, they discovered the campaign amid their research about phishing attacks triggered by the phishing-as-a-service operation named BulletProofLink. The procedure is reported to be offering low-cost domain hosting,...Continue Reading
Researchers have found that a spam campaign has revised its methods to add an extensive commodity remote access trojans or RATs and geolocation filtering to evade being detected by authorities. The said spam campaign focuses on distributing spear-phishing emails towards South American organizations. According to security researchers, the attacks were attributed to an advanced persistent threat or...Continue Reading
Cyber-espionage threat actors from China were reported to have breached about 10 internal networks of Indonesian agencies and government ministries. The attack includes the computer devices of Badan Intelijen Negara (BIN) – the primary intelligence services of Indonesia. Unexpectedly, the cyber-espionage attempt of threat actors from China was revealed in between a time when both...Continue Reading
According to military leaders of the UK, their armed forces are preparing to commence significant advantages regarding their cybersecurity capabilities in the following years. Cyberspace being confirmed as the fifth warfare domain together with land, air, sea, and space forces the defence authorities to improve their operations all across the West. The range of the...Continue Reading
Within two days of the phishing campaign, the US Department of Transportation or USDOT has been imitated by cyber-attackers. They operated on combined tactics such as forming new domains to copy and mimic federal sites to appear authentic and avoid being detected by authorities. Security researchers have identified at least 41 phishing emails between August 16 to...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.