Category

Hacking
sim swap attack smshing cryptocurrency
A man aged 20 from Dublin, was arrested and brought before the High Court on Thursday on foot of an extradition warrant. During a brief appearance, he indicated he understood the charges. He was remanded in custody until May 22. The US Attorney General for the Eastern State of Michigan said that their investigation had...
Continue Reading
data breach hacking fraud prevention
One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
atlassian server hacked inject trojans injection hacker malware
A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to inject trojans and infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide.   The vulnerability, tracked as...
Continue Reading
attack on banks smshing malware simjacking injection
It has been said before that financial institution is losing an astounding amount yearly from cyberattacks. Monetizing attack on banks and financial institutions are no longer concentrated by cybercriminals; instead they shifted attention to employees from large business organizations. Workers occupying positions under financial departments, accountants and bank are realized that they can steal money...
Continue Reading
chinese hacking group hack malware
The US Justice Department charged a Chinese hacking group with carrying out one of the largest criminal hacks in United States health care history that resulted in 79 million people having their personal information stolen. In the four-count indictment cited by the Justice Department, officials allege Wang Fujie, 32, and another man referred to only...
Continue Reading
electricfish trojan malware
Executive Summary Two days ago (9th May), a Joint effort between Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) published a Malware Analysis Report (MAR) about a Trojan malware variant known as ELECTRICFISH. A North Korean based malicious actor known as HIDDEN COBRA is known to have utilized this malware. The targets...
Continue Reading
gps tracker compromised data
Chinese-made GPS tracker that have no internet connectivity but use a SIM card to connect to a cell network are bought in bulk, rebranded, and resold by a number of companies worldwide.   UK cyber-security experts are calling for an immediate recall of a GPS tracker used as a panic alarm for elderly patients, monitoring...
Continue Reading
tflower ransomware hacking malware
Since 2017, the amount of ransomware incidences have become increasingly rampant and progressive. TFlower Ransomware concentrated their assaults against company networks, infiltrating the very core of everyday business operations.   There was a slight decline in the number of attacks from last year but came 2019, these business-targeting malwares have accelerated their assault in a...
Continue Reading
save the children fraud prevention malware phishing identity theft cyber criminal attacked charity
Scammers and cyber criminals attacked kid’s charity – Save the Children Federation, a well-known U.S. charity, into sending them approximately one million dollars. The attacker managed to access an employee’s email account and from there sent fake invoices and other documents designed to trick the organization into sending the money. Whatever online website scanners or...
Continue Reading
uc browser ucweb phishing phishingattacks
An address bar vulnerability with the latest versions of UC Browser and UC Browser Mini exposes millions of users to Phishing Attacks. The vulnerability was discovered by a cyber-security researcher, which allows an attacker to pose his phishing domain as the targeted site.   According to the researcher, the UC Browser phishing vulnerability exists only...
Continue Reading
1 2 3 13