Category

Fraud Prevention

Fraud Prevention 1

facebook hacked leaked compromised data social media vulnerability exploit

Facebook Hacked… Again? Maybe we are not that surprised

Hacked and leaked, ever since the Cambridge-Analytica issue erupted, we have seen never-ending posts in the different dark web and criminal forums about data peddled for a price about Facebook. The social media giant became a target for social engineer actors from other countries and various blackhat hacking skills. This 2020, iZOOlogic downloaded leaked Facebook...
Continue Reading
verkada surveillance camera hacked breach Arson Cats APT69420

Customers not affected after Verkada surveillance camera breach

This week’s trending topic in the cybersecurity community is the successful intrusion of the collective hacktivist APT69420 or Arson Cats that proves no one is secured. Though it is a small group of hackers, they could penetrate Verkada Security Company, a known recipient of Silicon Valley funding for its technology advancement when it comes to...
Continue Reading
microsoft instagram vulnerability bug bounty reward program ethical hacking

$50,000 reward for bug that could have allowed access to your Microsoft account

A 50,000 USD reward program recently made a noise because it was awarded to an independent researcher who submitted a vulnerability found on Microsoft and Instagram accounts to bypass the mentioned platform’s account recovery program service. Despite its high-level security to avoid such intrusion on their user’s account, the researcher was able to crack the...
Continue Reading
cybercrime work from home remote work fraud prevention vulnerability exploit

Remote work leveraged for cybercrime by adversaries in targeted attacks

Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...
Continue Reading
mobile apps location tracking personal privacy compromised data

Mobile apps location tracking is invading personal data privacy

The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...
Continue Reading
phone scams communications frauds money loss fraud prevention vishing SMSing

Phone scams stolen money from almost 40 percent of consumers in 2020

Almost 40% of telecommunication consumers have lost money to phone scams and frauds during the previous year based on a recent research report conducted by a Hiya, a telecommunication platform. It is now more than ever that consumers and organizations rely on using voice calls to process transactions with voice network traffic rising 184% in...
Continue Reading
cyber technology attack lives at risk

Lives are at risk on cyber and technology attacks

Technology advancement is considered the most significant breakthrough in every institution, business, and alike. Having such elevation gives an edge to every sector that promised faster and reliable services that ease people’s lives of the burden of manual work. We are in a period heavily dependent on the comfort of these technologies but always have...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
iobit ransomware DeroHe vulnerability brand abuse

IOBit group forum hacked to spread ransomware to members

New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection.  According to the report, the attack was orchestrated to the group forum of IOBit...
Continue Reading
FBI warning vishing attacks SIM swap

Warning of vishing attacks to stealing corporate accounts from FBI

With the increase in the statistics, the United States Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) announced by publishing a notice on focusing on Vishing Attack (Voice Phishing) modus operation.  Due to the pandemic situation, many companies drastically moved their operations to the comfort of their employee’s homes. Many companies...
Continue Reading
1 2 3 15