Category

Africa

Africa Page 1

Fin Fisher all time stealthiest malware spyware

FinFisher: One of the all-time stealthiest malware

A team of researchers pursued a stealthy malware called FinFisher spyware, dubbed as FinSpy for short. Almost eight months of investigation in uncovering this 2011 malware that now packs different improvements and upgrades.    What are the discoveries in this FinFisher malware?  Based on the research, a highly sophisticated malware infection method is equipped in the latest version of Finspy malware. The attackers...
Continue Reading
3 Bugs 41 vulnerabilities fix Android mobile phone Security Update

3 Bug fixes and almost 41 vulnerabilities found in this month’s Android Security Update

For October, Google releases the Android security updates. They address a total of 41 vulnerabilities that ranges between high and critical severity.  Every fifth day of each successive month, Google releases a complete breakdown of the Android OS security patch. This also contains both framework and vendor fixes. Therefore, this update also includes the remedies for the ten...
Continue Reading
Virtual machines Python ransomware campaign ESXi

Virtual machines got targeted by a new Python ransomware

Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines.  This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...
Continue Reading
bypass bug vulnerability Visa Apple Pay contactless payments

A bypass bug was found in Visa and Apple Pay in making contactless payments

A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...
Continue Reading
fake security update Android flubot malware exploit devices

A fake security update tricks Android users into downloading malware that could potentially exploit their devices

A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly.  FluBot malware can steal passwords, financial details, and more...
Continue Reading
Ransomware Healthcare Delivery Organizations cyberattacks

An onslaught of Ransomware in Healthcare Delivery Organizations might result to grave danger

IT security professionals were surveyed by a certain institution to accurately understand the ins and outs of how COVID – 19 affects healthcare delivery organizations. This survey also helps them figure out how ransomware cyberattacks on patients’ information are being kept at bay by the HDOs.  As for the research mentioned above, ransomware has already impacted healthcare organizations, causing grave...
Continue Reading
Pegasus spyware fear execution cyberattacks malware

Pegasus spyware creates fear due to being exploited in the execution of cyberattacks

Investigations have been conducted regarding the Pegasus spyware’s suspicious activities in monitoring civil rights agencies, government figures, and journalists all over the world to operate a new wave of cyberattacks.  Pegasus is a spyware system built by NSO Group that allows reading text messages, tracking calls, and more ways of harvesting information from devices. Initially, spyware is offered as a tool to combat crime;...
Continue Reading
Data breach African Bank ransomware attack

Data breach confirmed against the African Bank, warns clients to report any suspicious account activities

Debt-IN, an appointed professional debt recovery associate of African Bank, was confirmed to be attacked by cybercriminals last April this year. It was initially reported that there was no found proof of any ransomware attack. However, a successful attack was recently verified, which means that some customers’ personal information has been compromised, including some African...
Continue Reading
increase open source cyberattacks popular projects cyber vulnerabilities

Yearly increase of 650% among open-source cyberattacks exposes popular projects to cyber vulnerabilities

According to security reports, the substantial continuous progress of open-source supply and demand dynamics has been recently revealed. The report shows a 650% yearly increase in supply chain attacks regarding supply chain attacks and an enthralling division between the level of known cyber vulnerabilities present in popular and non-popular versions of a project.  A survey...
Continue Reading
Data Breaches from failures Firebase Databases

Data Breaches are triggered from failures in Firebase Databases

As the series of data breach incidents persist in the cybersecurity industry, database security has been recognized more. Even as of now, sensitive user data are still available all over the web. It seems like that the Firebase administrators are failing to abide by the protocols despite warnings and notifications to secure vital databases with passwords. Firebase...
Continue Reading
1 2 3 9