Category

Digital Risk Protection

Digital Risk Protection page 1

cyber technology attack lives at risk

Lives are at risk on cyber and technology attacks

Technology advancement is considered the most significant breakthrough in every institution, business, and alike. Having such elevation gives an edge to every sector that promised faster and reliable services that ease people’s lives of the burden of manual work. We are in a period heavily dependent on the comfort of these technologies but always have...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
github repository service malware abuse cybercrime threat actor attack vector

Cybercriminals abused GitHub repository services to host and distribute Malware

Github, an open-source software repositories platform, hosts many software development projects and files, making it the go-to website in terms of documentation and download channel for developers worldwide. These past few years, threat actors and cybercriminals abused and leveraged these accessible repositories to successfully distribute and host some Malware and malicious script components.   In...
Continue Reading
whatsapp terms of service third party risk assessment privacy policy update

Whatsapp sharing to Third Party: Terms of Service and privacy policy update

Whatsapp the messenger and call app that was merged with Facebook through the acquisition of Facebook wants to mandate its users to accept the updated terms of service and privacy policies until February 8, 2021. In case you don’t want to accept the new terms, a user may opt to delete their accounts. The important...
Continue Reading
google outage operation aurora DDOS china

Google outage a throw back to the sponsored hackers in China: Operation Aurora

A few days passed; the cyber community again experienced another worldwide Distributed-Denial-of-Service (DDoS) that hits one of the tech giant service providers. With billions of users, Google has been struck by such attacks that led to most of its services – Gmail, Calendar, and Youtube have been inaccessible for a few hours. Based on the...
Continue Reading
cPanel WHM Software 2FA Authentication Vulnerability

cPanel and WHM Software’s 2-factor authentication vulnerability

Another significant contribution to the cybercommunity has been submitted by an ethical cybersecurity hacker that prevents possible issues that may have compromised many known websites for their vulnerability report. According to the report, the vulnerability has been spotted with the well-known software cPanel and WHM. The company has been in the business since 1997, developing...
Continue Reading
credit card stealer malware magecart social media share button

Credit Card Stealer Malware discovered in social media share buttons

Cybersecurity experts that have been monitoring Magecart credit card stealer adversaries have again shared their latest discovery of the current tactics of the umbrella threat actors. On their submitted report, adversaries can conceal their malicious codes on mimicry of share button of popular social media platform from compromised online business websites. Since 2016 where the...
Continue Reading
Baidu Android mobile apps compromised data

Baidu Android mobile apps caught collecting sensitive user data

The recent scanning of an app of a cybersecurity group had confirmed that the Chinese-based Baidu Android apps were accessible right at your fingertips through Google Playstore can collect sensitive information from its users. According to the report, the application Baidu Maps and Baidu Search box collect information such as Phone Model, its specification, user’s...
Continue Reading
hospitals healthcare ryuk trickbot ransomware malware trojan

Hospitals still targeted by the Ryuk Trickbot Ransomware

With the ongoing battle with the Covid-19 pandemic, so is the exploitation of many health institutions being compromised by many adversaries. On the recently submitted report, which is based on the collaborative investigation performed by Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation, and Department of Health and Human Services of the United...
Continue Reading
germany Miltenyi Biotec malware attack ransomware

German company Miltenyi Biotec suffered a Malware attack

Headquartered in Gladbach, Germany, Miltenyi Biotec, a private biotechnology company, has announced that they have fully recovered from a malware attack that recently affected some portions of their network over the past couple of weeks.  Miltenyi Biotec has been working on COVID 19 related products. From their website’s official statement, they disclosed an isolated case...
Continue Reading
1 2 3 11