Category

Hacking

Hacking page 1

cyber threat attacks customer data theft US Health Insurance Industry 

Increasing risk of customer data theft on US Health Insurance industry 

The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records.  Health insurers or related...
Continue Reading
golang malware PSYA ransomware backdoor chachi image 1

GoLang written malware becomes a growing trend

A recent cybersecurity report says there’s been a 2,000% increase in the number of new malware written using the GoLang programming language since 2017. Both state-sponsored and non-state threat actor groups have written the GoLang-based malware and are actively adding this to their toolset. The PSYA ransomware is one of the newest malware found and...
Continue Reading
privateers hacking group ransomware tier syndicate

A new ransomware syndicate tier, the Privateers

A new type of ransomware syndicate has been classified by a cybersecurity firm named Privateers. These ransomware syndicates compose of threat actors that are financially motivated and government-backed cybercriminals prosecuted and hunted by law enforcement; however, they do not have the same status as state-sponsored APT hacking groups.   According to the report, the Privateers...
Continue Reading
whitehat hackers breach network north america utility ICS SCADA

Whitehat hackers successfully breached the network of North American utility

The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities.   Among the most significant cyber-attack against industrial organizations...
Continue Reading
apkpure client tampered triada malware trojan android mobile device

APKPure client app tampered by Hackers to distribute malware and trojan

One of the largest app stores outside of the Google Play Store, APKPure, was reported to have been infected with malware recently. The malware can allow hackers and threat actors to plant and distribute trojans into Android phones and other devices.  This is another supply chain attack with similarities to the recent attack on Gigaset,...
Continue Reading
php git server compromised supply chain attack

PHP’s git server gets compromised by another Supply Chain Attack

Another instance of a supply chain attack has been reported; this time, it’s on the Git repository of PHP and their data storage. The hacked repository and the codebase contents were tampered with. The incident’s investigation is ongoing and more details will be revealed in the upcoming days. On the initial reports, the malicious activity...
Continue Reading
facebook hacked leaked compromised data social media vulnerability exploit

Facebook Hacked… Again? Maybe we are not that surprised

Hacked and leaked, ever since the Cambridge-Analytica issue erupted, we have seen never-ending posts in the different dark web and criminal forums about data peddled for a price about Facebook. The social media giant became a target for social engineer actors from other countries and various blackhat hacking skills. This 2020, iZOOlogic downloaded leaked Facebook...
Continue Reading
verkada surveillance camera hacked breach Arson Cats APT69420

Customers not affected after Verkada surveillance camera breach

This week’s trending topic in the cybersecurity community is the successful intrusion of the collective hacktivist APT69420 or Arson Cats that proves no one is secured. Though it is a small group of hackers, they could penetrate Verkada Security Company, a known recipient of Silicon Valley funding for its technology advancement when it comes to...
Continue Reading
microsoft instagram vulnerability bug bounty reward program ethical hacking

$50,000 reward for bug that could have allowed access to your Microsoft account

A 50,000 USD reward program recently made a noise because it was awarded to an independent researcher who submitted a vulnerability found on Microsoft and Instagram accounts to bypass the mentioned platform’s account recovery program service. Despite its high-level security to avoid such intrusion on their user’s account, the researcher was able to crack the...
Continue Reading
cybercrime work from home remote work fraud prevention vulnerability exploit

Remote work leveraged for cybercrime by adversaries in targeted attacks

Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...
Continue Reading
1 2 3 23