Category

Digital Risk Protection

Digital Risk Protection page 1

whitehat hackers breach network north america utility ICS SCADA

Whitehat hackers successfully breached the network of North American utility

The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities.   Among the most significant cyber-attack against industrial organizations...
Continue Reading
cryptojacking malware cryptocurrency mining malware botnet

Cryptocurrency mining attacks and crypto-jacking on businesses on the rise again

A surge of cyberattacks on cryptocurrency businesses has been seen recently by the cybersecurity community. We all know that cryptocurrencies are fully decentralized. They have no authority that monitors crypto activities and transactions, which provides a free hand to threat actors to conduct attacks at their will. This fact, in addition to the soaring value...
Continue Reading
apkpure client tampered triada malware trojan android mobile device

APKPure client app tampered by Hackers to distribute malware and trojan

One of the largest app stores outside of the Google Play Store, APKPure, was reported to have been infected with malware recently. The malware can allow hackers and threat actors to plant and distribute trojans into Android phones and other devices.  This is another supply chain attack with similarities to the recent attack on Gigaset,...
Continue Reading
ethical hackers researchers hacked indian government critical vulnerabilities flaws

Researcher team hacked Indian government websites by using exposed git and env files

Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...
Continue Reading
cybercrime work from home remote work fraud prevention vulnerability exploit

Remote work leveraged for cybercrime by adversaries in targeted attacks

Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...
Continue Reading
SII Bharat Biotech Stone Panda APT10 Chinese State Hackers

SII and Bharat Biotech, Covid19 vaccine makers targeted by Chinese hackers

The Chinese hacking group Stone Panda or APT10 has been identified as responsible for the attacks on Indian vaccine makers, as confirmed by a cybersecurity firm. The hacking group had identified flaws and vulnerabilities in the IT infrastructure and software supply chain of the world’s largest vaccine maker companies, Serum Institute of India or SII...
Continue Reading
mobile apps location tracking personal privacy compromised data

Mobile apps location tracking is invading personal data privacy

The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...
Continue Reading
clubhouse social media app chinese government compromised data agora inc

Clubhouse social media app might be leaking data to Chinese Government

Launched amidst the pandemic in March 2020 with only 1500 users and a net worth of USD 100 million, the Clubhouse app soared up the digital market with a current count of estimated 10 million users and worth USD 1 billion in just 11 months aside from other found funding. The app became famous as...
Continue Reading
cyber technology attack lives at risk

Lives are at risk on cyber and technology attacks

Technology advancement is considered the most significant breakthrough in every institution, business, and alike. Having such elevation gives an edge to every sector that promised faster and reliable services that ease people’s lives of the burden of manual work. We are in a period heavily dependent on the comfort of these technologies but always have...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
1 2 3 11