Category

Africa

Africa page 1

CName Misconfiguration Subdomain Hijack Abuse DNS

CName Misconfiguration left thousands of companies open to attack

A recent web security scanning by a cybersecurity group confirmed that over 400,000 subdomains that have been abandoned are susceptible to malicious takeover invasion of many threat actors. According to the report, these abandoned subdomains result from misconfigured CName (canonical name) in the DNS layout of the hosting provider. The CName configuration is widely used...
Continue Reading
Zerologon Vulnerability APT10 hackers hacking group

APT10 targeting businesses on a global scale using Zerologon Vulnerability

A widespread and highly persistent cyber-attack has been discovered by security researchers. The series of assaults conducted by APT10 hacking group were found to have been leveraging the Zerologon vulnerability of Windows, targeting mostly Japanese firms but has connections to attacks happening in more than 17 territories around the world. No particular industry was targeted,...
Continue Reading
dark side of online shopping exploits threats risks vulnerabilities

The dark side of online shopping: Vulnerabilities, exploits, threats, and risks

Online shopping is part of the new normal. With the pandemic catastrophe that we are facing, physical stores are moving their products online. Great deals and offers are widely marketed online via various shopping websites. Black Friday, Cyber Monday, Cyber Week, Free shipping day, and Super Saturday are just some of the companies’ discounts during...
Continue Reading
ghimob trojan malware spyware android mobile device

Ghimob spy has been detected on your Android device

A Brazilian based threat group named Guildma has successfully infected 153 financial applications from different banks, exchanges, and cryptocurrencies. The threat actor developed a remote access Trojan malware called Ghimob to attack Android users, obtain access to the victim’s smartphone and financial information. They are currently targeting users from Angola, Brazil, Germany, Mozambique, Paraguay, Peru,...
Continue Reading
magento magecart attack malicious script credit card skimmer

Hackers attacked E-Shop Retailers operating outmoded Magento software

Security researchers have recently uncovered a sudden surge in cybercriminal activities involving several online businesses, more than 2800+, to be exact.   These e-commerce merchants have one thing in common – they are all running an outdated version of the Magento platform.   Since September, the attacks have been going on. That’s why security researchers...
Continue Reading
Network Access Academic Firms for sale Dark Web

Network access of 7000+ Academic Firms for sale on the Dark Web

A group of hackers just posted a “For Sale” notice over several Russian Dark Web forums. The sale involved access to the networks of over 7000+ organizations, the majority of which are educational institutions. From local government agencies, entertainment websites, bars, and other business websites, you name it, and the list goes on. The one...
Continue Reading
nitro software hacked compromised data breach dark web market

Nitro Software Hacked! Client and user data compromised

Nitro Software Inc., an Australian tech software company that provides document productivity and cloud services to its users and Fortune 500 clients, just got hacked. Known worldwide as the alternative provider of document productivity products – other than Adobe Acrobat, Nitro became one of the leaders in the PDF industry and digital transformation. It has...
Continue Reading
canva abused hosted phishing activities

Canva abused for phishing activities

Pay attention to cybercriminals who love to publish phishing sites targeting financial and big-time industries. They are taking advantage of Canva to host their phishing website to lure unsuspecting victims into gaining banking credentials and personally identifiable information. Recently, an Australian Graphic Design company Canva was reportedly abused by Cybercriminals. Canva was founded back in...
Continue Reading
malware pose as legit web services spear phishing attacks cyber attack scheme campaign

Malwares posing as legit Web Services to induce spear-phishing attacks

Threat actors are continually evolving, always finding new ways to widen their reach into cyberspace. Only this time, they seemed to have turned over a new leaf – rethinking their practices, transforming themselves and their schemes into legitimate web-based services to further their malicious and fraudulent activities involving spear-phishing attacks. With all the innovative ways...
Continue Reading
joker trojan malware google play store antimalware

Joker Trojan infected apps on Google Play Store

Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...
Continue Reading
1 2 3 5