Category

Executive Monitoring

Executive Monitoring page 1

vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
Zerologon Vulnerability APT10 hackers hacking group

APT10 targeting businesses on a global scale using Zerologon Vulnerability

A widespread and highly persistent cyber-attack has been discovered by security researchers. The series of assaults conducted by APT10 hacking group were found to have been leveraging the Zerologon vulnerability of Windows, targeting mostly Japanese firms but has connections to attacks happening in more than 17 territories around the world. No particular industry was targeted,...
Continue Reading
operation falcon BEC phishing threat actors antiphishing spear-phishing fraud prevention Nigeria

Operation Falcon: BEC Phishing Threat Actors Detained!

Three Nigerian nationals that are ostensibly pointed out as the Threat actors behind a malware distribution for phishing and other scams worldwide lead the joint force of INTERPOL, Nigeria Police Force cybercrime investigation, and Group-IB for their Operation Falcon in Lagos, Nigeria. There were reportedly 50,000 victims that were identified in an enormous Global Scam...
Continue Reading
iranian hackers apt charming kitten impersonation social engineering

Iranian APT group Charming Kitten impersonates journalists

After few months working under the radar, cybersecurity experts again have unraveled the repurposed modus of the Iranian APT group dubbed as Charming Kitten. Their main targets are usually to perform cyber espionage to victims from the United States, Israel, and other countries who typically are prominent people from being an activist, entrepreneurs, government, and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
twitter high profile account hijacked cryptocurrency scam social engineering

High Profile Twitter accounts hijacked to promote Cryptocurrency Scam

Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common...
Continue Reading
apple iphone zero day vulnerability cyberattack email hackers hacking infosec information security

Unseen exploits on iPhone opens the possibility of hacking

Security researchers detected critical flaws in pre-installed Apple E-mail applications on iPhone and iPad that are being exploited to spy on high profile victims. Cybercriminals have been utilizing the weaknesses for at least two years. Million iOS users are vulnerable in complete control of remote hackers on the device once their account is logged in...
Continue Reading
ministry of health singapore health care system data breach compromised data hacked hacking cyberattack

Singapore Health Care Systems Hacked – Patient Records Compromised

Cyber-criminals have stolen a whole bunch of personal and patient data in a record-breaking hack which contained data between June to July 2018. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals and other healthcare institutions. More than 1 Million patient’s personal records have...
Continue Reading
twitter ceo, jack dorsey hacked

Jack Got Hijacked – Twitter CEO’s Account Hacked

It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...
Continue Reading
UK Identity Theft and Cyber Fraud | Identity Fraud Prevention

UK Identity Theft and Cyber Fraud reaches its highest record level

As the years passed by, the rate of identity fraud and cyber fraud around UK rapidly increased causing to reach its highest record level this year. Researchers identified over 300,000 cases of fraudulent conduct recorded to the National Fraud Database in 2017, with data drawn from 306 organizations, including many major UK brands.Although these incidents...
Continue Reading
1 2