Category

Hacking

Hacking page 5

firefox mozilla ryptojacking spear phishing phishing remote code execution

Firefox exploits involves Remote Code Execution and CryptoJacking

The Mozilla Corporation has just patched a couple of zero-day weak points on its flagship browser – Firefox through two separate security updates. While the first zero-day flaw was described as a “remote code execution” vulnerability that enabled remote attackers to run a malicious code within the native process of the Firefox browser, the second...
Continue Reading
phishing attack employee direct deposit paycheck hackers hacking

Hackers can’t wait – They are accessing employees’ Direct Deposit Paycheck

If your paycheck hits your bank account through direct deposit, be on the lookout for emails requesting personal information including log-in credentials — they could be a phishing scam by hackers who want to access your bank account.   The Federal Bureau of Investigation (FBI) has released a warning in regards to hackers targeting direct...
Continue Reading
nasa hacked data breach compromised data

A NASA Laboratory just got infiltrated using a cheap US $20 PC

Just to have an overview of what exactly a cheap PC might be like – Raspberry Pi is a teeny-tiny device that can be tinkered with to gain deceptively high capabilities. This was demonstrated by a most recent report which confirmed that a NASA lab was hacked using a Raspberry Pi.   The alleged data...
Continue Reading
wordpress plugin vulnerability phishing redirect malware

WordPress plugins utilized for use in malicious campaign

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tagDiv Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages. In this hack, users, when redirected, are taken to irritating...
Continue Reading
sqlite magellan vulnerability bug hacking

Unpatched SQLite Database exposed data to hackers

Cybersecurity scientists have found a basic weakpoint in the broadly utilized SQLite database programming that uncovered billions of deployments to cyber criminals. Named as ‘Magellan’ by security researchers, the newfound SQLite imperfection could enable remote assailants to execute self-assertive or malignant code on influenced gadgets, spill program memory or crash applications. SQLite is a lightweight,...
Continue Reading
zerofont phishing technique office365

ZeroFont Phishing Technique – Simple yet effective

Cyber criminals area at it again. And this time, they are after familiar territory – using ZeroFont on Microsoft Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in...
Continue Reading
sim swap attack smshing cryptocurrency

USD$2.5M worth of stolen CryptoCurrency from the latest SIM Swap Attacks

A man aged 20 from Dublin, was arrested and brought before the High Court on Thursday on foot of an extradition warrant. During a brief appearance, he indicated he understood the charges. He was remanded in custody until May 22. The US Attorney General for the Eastern State of Michigan said that their investigation had...
Continue Reading
data breach hacking fraud prevention

Human Resources company suffers Data Breach

One seriously threatening part about data breaches and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...
Continue Reading
atlassian server hacked inject trojans injection hacker malware

Critical Atlassian server flaw used by hackers to inject trojans

A group of attackers are actively exploiting a critical vulnerability in Atlassian’s Confluence collaboration software to inject trojans and infect servers with the GandCrab ransomware. Confluence is a Java-based web application that provides a shared wiki-type workspace for enterprise employees and is used by tens of thousands of companies worldwide. The vulnerability, tracked as CVE-2019-3396,...
Continue Reading
attack on banks smshing malware simjacking injection

Attack on Banks: Tactics and Techniques used to target Financial Organization

It has been said before that financial institution is losing an astounding amount yearly from cyberattacks. Monetizing attack on banks and financial institutions are no longer concentrated by cybercriminals; instead they shifted attention to employees from large business organizations. Workers occupying positions under financial departments, accountants and bank are realized that they can steal money...
Continue Reading
1 3 4 5 6 7 17