Category

Fraud Prevention
bird miner malware apple macintosh antimalware digital risk digital risk protection cryptocurrency cryptomining cryptominer

Bird Miner – New cryptomining scheme aimed at Apple Mac users

Stemming from several reports from several security researchers, there’s a new cryptominer called The Bird Miner. It targets Apple Mac systems through an ‘Ableton Live 10’ torrent. The music production software costs several hundred US dollars, so many people are on the look for cracked versions that they can download without paying a dime. However,...
Continue Reading
iot devices vulnerabiliity p2p remote exploit

P2P weakpoint leaves millions of IoT devices exposed

Security experts discovered two serious vulnerabilities in the iLnkP2P P2P system that ìs developed by Chinese firm Shenzhen Yunni Technology Company, Inc. The iLnkP2P system allows users to remotely connect to their IoT devices using a mobile phone or a PC. Potentially affected IoT devices include cameras and smart doorbells. The iLnkP2P is widely adopted...
Continue Reading
cisco industrial network director security vulnerability threat intelligence malware antimalware malware protection

Critical malware allows RCE to Cisco Industrial Network Director

A high-severity malware has been found to Cisco’s enterprise-class Industrial Network Director that allows remote attackers to hijack this industrial network and allows attackers for arbitrary code execution as the root user. The Cisco Industrial Network Director (IND) is designed to help operations teams gain full visibility of network and automation devices in the context...
Continue Reading
qualcomm chipset chip vulnerability malware

Latest Qualcomm chipset vulnerability flaw allows entry for hackers

Qualcomm chipsets are generally the processor of choice for many smartphone users, owing to the firm’s powerful graphics hardware and developer-friendly nature. It’s not immune to chipset vulnerability flaws though, and its latest vulnerability is a big one. Security researchers discovered the flaw last year, allowing cyber-criminals to gain private data and security keys in...
Continue Reading
iot devices telnet data leaks compromised data hackers hacker hacking

IoT telnet leaks – Hacker exposes Telnet credentials for more than 500k Devices

A hacker who runs a DDoS Service business from the Dark Web and across the criminal internet forums lately made the front page of the internet discussion through numerous tech-news site as he had published a list of IoT Telnet device credentials amounting to 515,000  devices that he had “cracked.”  The list of exposed credentials...
Continue Reading
nvidia gpu display driver vulnerability hacking hack

American GPU Production Company Patches Display Driver Flaw

American Technology Company NVIDIA, designers of top graphics processing units – issued yet another security update to fix three high and medium severity security issues in the NVIDIA GPU Display Driver that could lead to code execution, denial of service, escalation of privileges, or information disclosure on vulnerable Windows machines. Even though to abuse the...
Continue Reading
labcorp data breach compromised data leak

Massive Data Leak Debunks Data of 7.7 Million LabCorp Customers

A total of 7.7 million customers of the medical testing giant LabCorp exposes their personal and financial data leak to a security breach of the American Medical Collection Agency (AMCA), a third-party billing collection firm.This third-party billing collection firm have been recently breached another competing medical company of the LabCorp, the Quest Diagnostics, with over...
Continue Reading
winnti malware linux antimalware chinese hackers

Security researchers discover Linux version of Winnti malware

Winnti malware summary Linux version of Winnti has discovered in the wild while investigating a recent cyber attack against a pharmaceutical giant. Winnti Windows predecessor has been used by Chinese cybercriminals for the past decade to launch attacks on systems worldwide. It is believed by security experts that several Advanced Persistent Threat (APT) groups operate...
Continue Reading
phishing attacks microsoft netflix paypal antiphishing impersonation

Phishing attacks mostly impersonate Microsoft, Netflix & PayPal accounts

Phishing Summary Phishing attack has never been so innovative when it comes to deception. Latest report determines big consumer software companies like Microsoft, Netflix, and Paypal were impersonated by malicious actor to carry out the most phishing attacks. They have utilized the immense popularity of Microsoft Office’s 365 accounts to send phishing emails to users....
Continue Reading
google play store app malware keylogger antimalware hacking

Play Store apps laced with malware are recording your keystrokes

Cyber-security researchers have just discovered hundreds of malicious Google Play Apps infected with Windows Executable files. These infected apps specifically include teaching and tutorial apps – Learn to Draw Clothing (teaching people how to draw design clothing), Gymnastics Training (tutorial about gymnastics moves), and Modification Trail (an app showing ideas of trail bike modification). Surprisingly,...
Continue Reading
1 2 3 6