Category

Telecommunications

Telecommunications Page 4

iranian Chafer APT group targets kuwait saudiarabia compressor

Iranian Chafer APT Group operate against Kuwait and Saudi Arabia

Middle East Espionage Bitdefender had released their recent analysis report today for the latest crime they were able to pin down. They were able to name the fraudster the Chafer APT (also known as APT39 or Remix Kitten), which many believed to be a country backed hacker of the Iranian government. The group has been active since 2014 and has...
Continue Reading
printdemon bug vulnerability

PrintDemon: Old Windows component and gateway for hackers

In one of the latest reports released online, a couple of cybersecurity researchers accounted for their discovery of a sneaky bug lurking within an old Windows Operating System component in charge of overseeing the default printing processes and functions for PCs (Personal Computers). For a little bit of nostalgia, those who are familiar with the...
Continue Reading
citrix sharefile controller vulnerability security patch

Citrix vulnerabilities could compromise your company’s corporate data

Citrix Systems, Inc. is a multinational tech company that delivers virtualization technologies, server applications, and cloud computing innovations for desktops and other computing platforms. It became popular for its development of remote access products for Microsoft, enabling user machines to access different remote resources and technologies. In a most recent observation by several cyber security...
Continue Reading
remote access tool malware shakespearean antimalware rat poetrat

Pandemic shakespearean Remote Access Tool

The exposure of the Remote Access Tool Cisco Talos researchers, as part of their malware detection process, able to find new attacks within a specific sector in Azerbaijan, as reported. The program is a malware remote access trojan (RAT)  unknown family protocol. It can gather intel from the infected system from essential data such as...
Continue Reading
vmware bug vulnerability

VMware feasted on a Bug Rated 10

Working with many systems or maintaining them is very costly and time–consuming in a corporate business technology need. To cope up with this demand, one can be said as an excellent development for this matter is the use of VMWare.   With this software, a single administrator can maintain and update many different systems with the...
Continue Reading
WordPress Yuzo Plugin Becomes Scamming Tool

WordPress Yuzo Plugin Becomes Scamming Tool

The Yuzo Related Posts plugin, which is installed on over 60,000 websites, was removed from the WordPress.org plugin directory on March 30, 2019 after an unpatched vulnerability was publicly, and irresponsibly, disclosed by a security researcher that same day.   The vulnerability, which allows stored cross-site scripting (XSS), is now being exploited in the wild....
Continue Reading
China Spy Chips

China Spy Chips Embedded in US Tech Servers

Tech Companies have ardently denied Bloomberg’s declaration that China’s Super Micro gave them hardware loaded with spy chips, but that isn’t stopping all sorts of accusations from pouring in.   Bloomberg claims it has obtained documents from security researcher Yossi Appleboum that reportedly show evidence of an unnamed major US telecom finding “modified hardware” from...
Continue Reading
Cox Communications

Cox Communications Breached By “A Simple Bug”

Just earlier this month, a group of researchers uncovered a rather simple insecurity on the website for Cox Communications, a US cable and internet provider with around six million customers. The problem they uncovered would have given attackers an all-out access to user accounts and gain access to sensitive user information like billing and credit...
Continue Reading
UAE SIM-swap Scam

UAE SIM-swap Scam

Several banks in the UAE are now being tasked to warn their customers against a newly developing fraudulent scheme that exposes valuable banking information. These fraudsters can gain access to anyone’s text (SMS) notifications and OTPs (One Time Passwords) from their mobile devices. All they need to pull off this malicious SIM activity is a...
Continue Reading
SMiShing

SMiShing – a resurgent phishing based threat.

SMiShing – a phishing based threat against the Mobile Channel.   SMiShing is a phishing based attack that leverages the Short Message Service (SMS) or phone based text message. SMiShing or Smishing has been around for many years now so it is not a new threat but a persistent threat that is evolving.   With...
Continue Reading
1 2 3 4