Category

Industry

Industry page 1

undocumented chinese malware campaign cyberattack winnti apt41

Cybersecurity researchers revealed an undocumented Chinese Malware used in recent attacks

A new disclosure has been made by cybersecurity researchers regarding a series of cyberattacks by a Chinese threat actor targeting government and private organizations in Hong Kong and Russia with a new undocumented malware backdoor.   The attack campaign seems linked to APT41 Winnti. Initially recorded last May 12,2020, the hacking group used LNK shortcut script...
Continue Reading
Genesis Market Place Back Blackhats dark web

Genesis Market Place is back – Blackhats who do not run away

Blackhats who do not run away will continuously cause havoc and insecure private data breach to individuals and companies. Though it is rare for adversaries to honour their customers, yesterday the doubt of security researchers and adversaries were proven wrong. Both onion and Clearnet version of the Genesis Market website is up and running. Yet,...
Continue Reading
hard hit leading game publisher Ubisoft leaked credentials malware

Leaked credentials now hits hard on leading game publisher Ubisoft

Affected by the data leak mostly are companies from the financial industry, but we should be aware that other industries are also targeted. Behold the gaming industry is now the internet‘s talk, where it is reported by a threat advisory post that there are 500,000 leaked credentials are for sale online. The alarming thing is...
Continue Reading
5G Network discovered vulnerability DOS MITM User Location Data Leak

Newly discovered vulnerability on 5G Network allows hackers to track user locations and data

The latest mobile network technology 5G is being rolled out gradually on major cities around the world. In line with the infrastructure deployments, analysis of the network architecture has revealed some potential weakness insecurity that when exploited by hackers and threat actors can enable them to perform cyber-attacks such as a denial of service to...
Continue Reading
Fraudulent phishing websites Internet anti phishing solutions antiphishing

Fraudulent phishing websites are taking over the Internet

With the pandemic crisis that we are facing today, the Internet has become a necessity. The government’s lockdown and social distancing force us to relay our everyday activities such as shopping, financial transaction, and communication to online websites. The increased usage of the Internet leads to more cyber-attacks that target individuals and companies via fraudulent...
Continue Reading
Cicada group Zerologon Vulnerability Japanese Organizations apt10 stone panda

Cicada Group exploits Zerologon on targeted Japanese Organizations

The researchers’ recent discovery that exposes the Microsoft platform’s Zerologon vulnerability is making noise within the Cybersecurity community. Tagged as CVE-2020-1442, it is the vulnerability that adversaries can exploit to gain access to the Domain Controller of the network through compromised elevated privileged accounts. In this scenario, adversaries can access the network by ciphering the...
Continue Reading
capcom data breach ragnar ransomware malware

Capcom Breach and Ransomware Attack Update

Prominent game developer company, Capcom, has recently reported that they have been victimized by a ransomware attack. Based on their publicized incident report and initial findings, the attack happens on the morning of November 2, 2020, upon stumbling connectivity issue that results in some data being destroyed and encrypted on their server and later receiving...
Continue Reading
microsoft office 365 phishing email campaign

A sophisticated phishing email targeting Office 365 users is in the wild

Microsoft has warned the public about a new phishing campaign targeting Office 365 users via their Twitter account on Tuesday, November 17th.       This newly discovered phishing email was seemingly a sophisticated one, as it was designed to bypass and dodge secure email gateways as per the Microsoft analysis. The Threat actors behind...
Continue Reading
ransomware attack multi cloud infrastructure malware trojan

Ransomware advances on Multi-Cloud Infrastructure

The first documentation of a ransomware attack was in the year 1989. A Harvard-educated biologist developed the malware where a compromised diskette named “AIDS Information – Introductory Diskettes” were dispersed to the attendees of an internal conference and spread to more than 90 countries. These give a concept to cybercriminals that they can monetize from...
Continue Reading
ghimob trojan malware spyware android mobile device

Ghimob spy has been detected on your Android device

A Brazilian based threat group named Guildma has successfully infected 153 financial applications from different banks, exchanges, and cryptocurrencies. The threat actor developed a remote access Trojan malware called Ghimob to attack Android users, obtain access to the victim’s smartphone and financial information. They are currently targeting users from Angola, Brazil, Germany, Mozambique, Paraguay, Peru,...
Continue Reading
1 2 3 7