Category

Digital Risk Protection

Digital Risk Protection page 1

hospitals healthcare ryuk trickbot ransomware malware trojan

Hospitals still targeted by the Ryuk Trickbot Ransomware

With the ongoing battle with the Covid-19 pandemic, so is the exploitation of many health institutions being compromised by many adversaries. On the recently submitted report, which is based on the collaborative investigation performed by Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation, and Department of Health and Human Services of the United...
Continue Reading
germany Miltenyi Biotec malware attack ransomware

German company Miltenyi Biotec suffered a Malware attack

Headquartered in Gladbach, Germany, Miltenyi Biotec, a private biotechnology company, has announced that they have fully recovered from a malware attack that recently affected some portions of their network over the past couple of weeks.  Miltenyi Biotec has been working on COVID 19 related products. From their website’s official statement, they disclosed an isolated case...
Continue Reading
iranian hackers US voter's data hacking FBI

State-sponsored Iranian Hackers infiltrated and stole US Voter’s Data

A recent advisory from the United States Cybersecurity Agency reveals another alarming incident related to US election activities. It was known that a group of Iranian hackers infiltrated and accessed a large number of US voters’ registration information and attempted to access similar contents from other states. According to undisclosed sources, the attacks were coordinated,...
Continue Reading
true social media mobile app compromised data exposed database

True social media mobile app exposed private data and messages

The True social media mobile app that prides itself on protecting user privacy had a security lapse that left their servers exposed to the public. The spilled private data were left for anyone on the internet to read. The social media mobile app was launched in 2017 by Hello Mobile, a small virtual cell carrier...
Continue Reading
Comcast Cable remote tv box set vulnerability exploit malicious code injection WarezThe Remote

Comcast Cable remotes and TV top box vulnerability

A recent update to TV top box software has been released by Comcast to its 18 million devices used at home for digital TV subscribers in the United States region. Affected devices are specifically the XR11 entertainment platform. This has been immediately patched after cybersecurity ethical hackers able to scrutinized and hacked its communication platform....
Continue Reading
donald trump campaign website hacked us election defacement

Donald Trump campaign website hacked

The official campaign website of the United States President Donald Trump was reportedly defaced for almost half an hour on Tuesday, October 27, shortly before 4:00PM PST. A journalist at Jewish News of Northern California, Gabriel Lorenzo Greschler, was reportedly among the first to spot the defacement while researching a climate change article and immediately...
Continue Reading
tutanota email distributed denial of service dns ddos

Tutanota encrypted email service suffers DDoS Attack

Series of distributed denial of service (DDoS) was experienced by Tutanota mid of this month. The attack was able to completely halt its use entirely and affects over 2 million of its users. Unknown cyber attackers not only attack the company itself but also spread its malicious activity to the DNS provider of the company,...
Continue Reading
Shenzhen Zhenhua Data Tech Data Leak compromised data china chinese company

Shenzhen Zhenhua Data Technology allegedly collected Data

Chinese data services company Shenzhen Zhenhua Data Technology is now being questioned with its database and its application called the Overseas Key Information Database or OKIDB. The company is owned by a government-backed military research company – China Electronics Technology Group (CETC). Wherein its CEO is a known supporter of hybrid and psychological warfare, which...
Continue Reading
us department of defense vulnerabilities software hardware dod white hat hackers vulnerability assessment

U.S. Department of Defense disclosure on vulnerabilities

A recent disclosure from the U.S. Department of Defense details has been announced to the public. This is about their infrastructure system’s critical and high severity vulnerabilities. The vulnerabilities can allow threat actors to exploit the systems by hijacking a subdomain, remote code execution, or view and capture data and files on a vulnerable machine...
Continue Reading
razer customer info leak misconfigured server data leak compromised data fraud prevention

Thousands of Razer customer information leaked on a misconfigured server

On the 18th of August, an Independent Cyber Security Consultant, Volodymyr “Bob” Diachenko has discovered a leaked customer data on a gaming-gear merchant, Razer, that is believed to be a result of server misconfiguration. Diachenko stumbled upon a misconfigured Elasticsearch cluster that exposed Razer’s customer private information for everyone else to see.     There are...
Continue Reading
1 2 3 10