Category

Financial Malware
bird miner malware apple macintosh antimalware digital risk digital risk protection cryptocurrency cryptomining cryptominer

Bird Miner – New cryptomining scheme aimed at Apple Mac users

Stemming from several reports from several security researchers, there’s a new cryptominer called The Bird Miner. It targets Apple Mac systems through an ‘Ableton Live 10’ torrent. The music production software costs several hundred US dollars, so many people are on the look for cracked versions that they can download without paying a dime. However,...
Continue Reading
iot devices vulnerabiliity p2p remote exploit

P2P weakpoint leaves millions of IoT devices exposed

Security experts discovered two serious vulnerabilities in the iLnkP2P P2P system that ìs developed by Chinese firm Shenzhen Yunni Technology Company, Inc. The iLnkP2P system allows users to remotely connect to their IoT devices using a mobile phone or a PC. Potentially affected IoT devices include cameras and smart doorbells. The iLnkP2P is widely adopted...
Continue Reading
Google Play Store cryptomalware google play mobile app malware antimalware

Two Crypto-Stealing apps on Google Play Store abused by hackers

Cyber-security researchers have just discovered two (2) malicious crypto-stealing apps in the Google Play store that have been downloaded over 1,000 times. The two fraudulent apps are “Trezor Mobile Wallet” and “Coin Wallet – Bitcoin, Ripple, Ethereum, Tether,” and security researchers note that both apps share an “overlap in code and interface.” The fake Trezor...
Continue Reading
wireless sierra es450 security vulnerability Vulnerabilities forensic analysis

Weakpoints in Sierra Wireless AirLink ES450 discovered

Cyber Security Researchers at CTG disclosed a dozen vulnerabilities affecting Sierra Wireless AirLink gateways and routers, including several serious flaws. Some of the flaws could be exploited to execute arbitrary code, modify passwords, and change system settings. Sierra Wireless AirLink gateways and routers are widely used in enterprise environments to connect industrial equipment, smart devices,...
Continue Reading
rakhni malware ransomware cryptomining spear phishing antimalware antiphishing cryptomalware Ransomware and Cryptocurrency mining spyware

Is your machine good for cryptomining or ransomware: This virus can decide

Ransomware and Cryptocurrency mining attacks have been very frequent since last year. Attacking not only unsuspecting individuals, but corporate systems as well. They share a few similarities and mostly engage in digital currencies. And like other malwares and hacking tools, they are also on the verge of evolving. These are both non-complex intrusions in nature...
Continue Reading
cisco industrial network director security vulnerability threat intelligence malware antimalware malware protection

Critical malware allows RCE to Cisco Industrial Network Director

A high-severity malware has been found to Cisco’s enterprise-class Industrial Network Director that allows remote attackers to hijack this industrial network and allows attackers for arbitrary code execution as the root user. The Cisco Industrial Network Director (IND) is designed to help operations teams gain full visibility of network and automation devices in the context...
Continue Reading
qualcomm chipset chip vulnerability malware

Latest Qualcomm chipset vulnerability flaw allows entry for hackers

Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...
Continue Reading
iot devices telnet data leaks compromised data hackers hacker hacking

IoT telnet leaks – Hacker exposes Telnet credentials for more than 500k Devices

A hacker who runs a DDoS Service business from the Dark Web and across the criminal internet forums lately made the front page of the internet discussion through numerous tech-news site as he had published a list of IoT Telnet device credentials amounting to 515,000  devices that he had “cracked.”  The list of exposed credentials...
Continue Reading
streaming service video on demand critical malware antimalware sql injection

Widely deployed streaming platform turns out to be infected by multiple critical malware

Critical malware used by hackers to hijack televisions are now attacking the popular IPTV middleware platform of more than a thousand of regional and international online media streaming services. This critical  malware execution flaw, if exploited, will grant attackers the power to seize control of the streaming service and content on display and will extract...
Continue Reading
Fxsmsp hacked hacking hacker trendmicro antivirus av solution anti-virus

Trend Micro is one of the anti-virus firms hacked by Fxsmsp

On a recent report regarding Fxsmsp hacking group that has obtained the source code of these Anti-virus firms. The names of the victims remained undisclosed to the public due to the sensitive nature of the matter and because authorities had been alerted for this incident now, as the victims have released statements that either downplay,...
Continue Reading
1 2 3 24