Category

Africa

Africa page 1

CISA emergency warning microsoft exchange server flaw vulnerability

Emergency directive warning issued by CISA following Exchange Server flaw disclosure

An emergency directive warning has been issued by the Cyber Cybersecurity and Infrastructure Security Agency (CISA) on a current and active exploitable vulnerability. This is right after Microsoft released an out-of-band patch that will address multiple zero-day vulnerability flaws on-premises versions of the Microsoft Exchange Server.   This alert from CISA possibly stems from the...
Continue Reading
google alerts fake adobe flash player update malware spyware campaign

Google Alerts used on campaign to push fake Adobe Flash Player update

For better customization and personalization of accounts, Google launched the Google Alerts service feature to provide email or RSS (Really Simple Syndication) feed to its users on the latest and hottest news about a specific keyword or topic of user’s interest that tops or adds on the Google search index. As an easy to use...
Continue Reading
hack MasterCard PIN bypass VisaCard cash card

New hack allow cyber-attackers to do MasterCard PIN bypass when using a Visa Card

A new type of hack to exploit cash cards has been disclosed by cybersecurity researchers that allow cybercriminals to trick and bypass POS terminals to enable a transaction to use a victim’s Mastercard contactless card functioning as a Visa card. A group of academic researchers delved into demonstrating a PIN bypass hack that permits threat...
Continue Reading
phishers linkedin phishing attack social media fake login page

Phishers are now using the LinkedIn platform for a phishing attack

A phishing attack is one of the significant threats that individuals and companies faced. With the pandemic crisis and people are on edge, cybercriminals are eager to achieve a higher number of success with their phishing campaigns. Last year was a year of phishing sites. A multinational technology company detected a high record of around...
Continue Reading
malware adware phishing campaign facebook messenger social media

Phishing campaign against Facebook users

A recent phishing campaign has been rediscovered victimizing again Facebook users. The said modus has been around since 2017 and repurposed with the same tactic has been spotted since then. This new operation is believed to have resurfaced in January 2020 and targets users mainly from Germany and some more from different locations worldwide. Based...
Continue Reading
compilation of data breaches largest collection of leaked data comb

Compilation of Many Breaches, largest collection of leaked email and credentials for free

Following the noise created in 2017, an unknown adversary again published an enormous collection of compromised email credentials with a password with a total count of over 3.2 billion doubling the number from the previous collection of 1.4 billion. Tagged as Compilation of Many Breaches (COMB), the collection of credentials consists of breaches from the...
Continue Reading
ransomware cartels double extortion fraud prevention

The double extortion trend that ransomware cartels utilize to coerce businesses

Ransomware has indeed become its own industry and has come a long way. From the early days with the AIDS Trojan to the current more modern, unique and business-like model Ransomware-as-a-Service preys on companies and organizations worldwide. There is a new ransomware technique being played by the adversaries called ‘double extortion’. They lock their victims’...
Continue Reading
logokit fake pages real-time phishing tool antiphishing

LogoKit, new phishing page building tool creates fake webpages real-time

A new phishing tool variant has been unravelled by cybersecurity researchers that ran rampant globally in the past months. The researcher’s statistics report shows that LogoKit has already been seen on more than 700 sites in the past few months and more than 300 domains a few weeks ago. The phishing tool is said to...
Continue Reading
solarwinds repositories source code leaked data sale dark web

Solarwinds and other repositories leaked data for sale

We have been consistently checking the SolarWinds hack incident since it erupted. Part of our monitoring includes consistent scans to known and infamous dark web forums that currently exist on the web. Through different media, researchers and our search, we also found and confirmed a website calling itself ‘SolarLeaks’. In December 2020, SolarWinds disclosed that...
Continue Reading
genesis market bots loggers compromised machines threat actors darknet dark web

Genesis Market place: Bots, loggers, compromised machines for Threat Actors

In the 4th quarter of 2020, Genesis Market place went down and left many patrons hanging, because most of the users invested a lot of bitcoin in the Genesis Market place wallet. Now that the site is currently under construction, their money cannot be refunded:       Exit Scam? Exit scam sounds a possible...
Continue Reading
1 2 3 6