Cybersecurity researches have recently discovered a flaw in Emotet malware that allowed for a ‘kill-switch’ to get activated that would stop the banking trojan malware from spreading and infecting systems for up to six months. The Emotet malware gained notoriety for affecting 5% of organizations globally. Typically, all people got used to hearing that vulnerabilities...Continue Reading
A collaborative attack has been unwrapped recently by cybersecurity experts that have been targeting the Linux Operating System. Developers such as Red Hat Enterprise, CentOS, and Debian are said to be the focus of this malicious attack. According to the uncovered pieces of evidence, the attack was perpetrated by 5 different Advanced Persistent Threats (APT)...Continue Reading
With its sudden popularity and discovery in May 2020, Lucifer botnet malware again makes noise within the Cybersecurity community. A new report has confirmed that the latest update of the malware becomes more lethal as this can now infect a network that uses the Linux Operating system. With it already being a powerful tool for...Continue Reading
A reportedly high-risk vulnerability of TeamViewer was recently discovered targeting Windows users, which, if exploited, could result in Cybercriminals stealing your system password and further exploitations. This attack does not require interaction from their victim as it can perform automatically. About TeamViewer TeamViewer is a software application that is used for remote control, desktop...Continue Reading
Europay, Mastercard, and Visa or simply called as EMV, is a secure technology that refers to a credit card with a smart chip. This technology was adopted by most of the banks worldwide as EMV Cards are believed to be more secure than the 50-year-old magnetic stripes technologies. But a Security Research Team recently made...Continue Reading
Not too long ago, cyberattacks from different avenues, directions, and groups were active during this pandemic. Activities such as ransomware attack, phishing attacks, social engineered scams, corporate insider leaks, forced intrusion database breach, and so much more to mention happened had taken place. This is, in fact, the same observation by the Interpol itself. Dave...Continue Reading
A newly discovered campaign has been unraveled again, targeting the famous Microsoft Office 365 accounts. In the recent report of Cybersecurity experts, they unveiled the use of Google Ads and other related Google applications and Microsoft Platform such as Office 365 login pages as their current modus operandi tool for these adversaries to continue their...Continue Reading
More victims are coming out of the open voluntarily disclosing that they have been indirectly and directly affected by the recent Blackbaud breach. Blackbaud, the service provider of a financial management software recently paid a ransom for a notorious ransomware group to avoid the following: Permanent data encryption Dumping the affected data out in public...Continue Reading
A stealthier and more lethal attack has been observed and reported by many cybersecurity experts roaming around the android phone user’s community. From the usual malware of infecting android phones to manifest infection targeting banking apps, pieces of evidence show that attackers also included other social media, online streaming, and shopping app on the list...Continue Reading
With the evidence gathered by Cybersecurity experts, they were able to conclude that even after the ransomware attack has been dealt, perpetrators continue its reconnaissance on their prey. As reported, on the recently concluded Maze Ransomware attack, a department Incident Report that circulates within the network of ST Engineering named VT San Antonio Aerospace (VT...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.