Category

Executive Monitoring

Executive Monitoring page 1

iranian hackers apt charming kitten impersonation social engineering

Iranian APT group Charming Kitten impersonates journalists

After few months working under the radar, cybersecurity experts again have unraveled the repurposed modus of the Iranian APT group dubbed as Charming Kitten. Their main targets are usually to perform cyber espionage to victims from the United States, Israel, and other countries who typically are prominent people from being an activist, entrepreneurs, government, and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
twitter high profile account hijacked cryptocurrency scam social engineering

High Profile Twitter accounts hijacked to promote Cryptocurrency Scam

Multiple high-profile and verified Twitter accounts were hacked on Wednesday by Cybercriminals that used the official accounts to spread a Cryptocurrency scam. The post lures the followers of high-profile accounts to send payment to a BTC Address within 30 minutes and “as payback” they will have the money back double in value – a common...
Continue Reading
apple iphone zero day vulnerability cyberattack email hackers hacking infosec information security

Unseen exploits on iPhone opens the possibility of hacking

Security researchers detected critical flaws in pre-installed Apple E-mail applications on iPhone and iPad that are being exploited to spy on high profile victims. Cybercriminals have been utilizing the weaknesses for at least two years. Million iOS users are vulnerable in complete control of remote hackers on the device once their account is logged in...
Continue Reading
ministry of health singapore health care system data breach compromised data hacked hacking cyberattack

Singapore Health Care Systems Hacked – Patient Records Compromised

Cyber-criminals have stolen a whole bunch of personal and patient data in a record-breaking hack which contained data between June to July 2018. The hacking, according to Singapore authorities was well-executed, well-planned and precisely aimed towards attacking the country’s largest group of hospitals and other healthcare institutions. More than 1 Million patient’s personal records have...
Continue Reading
twitter ceo, jack dorsey hacked

Jack Got Hijacked – Twitter CEO’s Account Hacked

It was a very unpleasant Friday, at approximately 12:45 PM Pacific Standard Time, Twitter handle @jack – confirmed to be of Jack Dorsey’s (Twitter’s Chief Executive Officer) account, began sending out a series of highly inappropriate and notably disturbing tweets. They included a mix of racial slurs, obscenity, profanity, nazi-inclined campaigns, and even a bomb...
Continue Reading
UK Identity Theft and Cyber Fraud | Identity Fraud Prevention

UK Identity Theft and Cyber Fraud reaches its highest record level

As the years passed by, the rate of identity fraud and cyber fraud around UK rapidly increased causing to reach its highest record level this year. Researchers identified over 300,000 cases of fraudulent conduct recorded to the National Fraud Database in 2017, with data drawn from 306 organizations, including many major UK brands.Although these incidents...
Continue Reading
Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Sophos 2019 Threat Report unveils the rise of the hand-delivered, targeted cyberattacks as criminals stalk victims to bank millions

Oxford, U.K. – Nov. 14, 2018 – Sophos (LSE: SOPH) today propelled its 2019 Threat Report giving bits of knowledge into developing and evolving cybersecurity trends. The report, delivered by SophosLabs researchers, investigates changes in the risk scene in the course of recent months, revealing patterns and how they are relied upon to affect cybersecurity in 2019.   “The threat landscape is undoubtedly...
Continue Reading
fraud

Cloud HR Firm ComplyRight – Hacked!

The seriously threatening part about data intrusion and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
Dark Web Collection

Dark Web Collection: username, passwords and the danger it brings

Why account credentials? Account credentials are basically the email/username and password of a user for their own personally or business use. But what if these information gets exposed online? To criminals account credentials are important and they consider it as an essential in their threat structure. Ever since breaches of database has been making the...
Continue Reading
1 2