As the series of data breach incidents persist in the cybersecurity industry, database security has been recognized more. Even as of now, sensitive user data are still available all over the web. It seems like that the Firebase administrators are failing to abide by the protocols despite warnings and notifications to secure vital databases with passwords. Firebase...Continue Reading
An exposure online has affected more than 61 million records from an unsecured database related to wearable technology and fitness services. Cybersecurity researchers reported last Monday that the exposed database belongs to GetHealth. GetHealth is an organization based in New York which prides itself as a combined solution to access health and wellness data for hundreds of wearables, medical...Continue Reading
Kumsong 121, a group of hackers from North Korea, has recently executed a cyberattack with social media. Researchers warn cellphone and computer users to be cautious since the hacking and attacks from North Korea have been growing and becoming more sophisticated. A cybersecurity researcher reported that they have detected a new and advanced persistent threat or APT through a...Continue Reading
A record of nearly 500,000 login names and passwords from Fortinet VPN has been leaked by cyber attackers, wherein these details were said to have been scraped from exploitable devices in the past months. The attackers clarify that the Fortinet exploited vulnerabilities were patched and that many VPN credentials are still deemed valid. The VPN scraped credentials enable attackers to access a network to...Continue Reading
Recent reports have identified a new trend where cybercriminals target internet bandwidth connections to gain illegal income. This new method involves the overusing of proxyware, which has been acquiring the interest of the cybercrime industry. The Internet Bandwidth trade Honeygain and Nanowire, both internet-sharing via proxyware platforms, have recently been targeted by cybercriminals in an attempt to...Continue Reading
Last year, Google Play Store removed 17 mobile applications after being identified to be infected with the Joker malware. If a user installs one of the 17 infected apps, the Joker malware will begin to spy and steal the user’s data stored on the device. It will duplicate SMS text messages, contact lists, and more. ...Continue Reading
A brand new cyberattack scam has been invented by cybercriminals recently. They bait their targets, specifically several website owners, into accessing an infected file by sending them fake alerts and notifications saying their website is currently experiencing a DDoS attack or attack distributed denial-of-service. If the website owner opens the message sent by the threat actors, it...Continue Reading
Five groups of different Chinese intelligence have been executing a notorious Windows backdoor malware called ShadowPad with their operation since the year 2017, which enables threat actors to upload files, create processes, store information, steal private data, and download malicious elements. According to researchers, many threat groups have found the use of ShadowPad malware as significantly convenient due to...Continue Reading
Apple has recently released the XProtect, and antivirus technology mainly created for the YARA signature-based detection of any suspicious malware that can infect macOS. However, it has been reported that this act of Apple to potentially protect its operating system via XProtect has seemed to fail since the surfacing of a fresh variant of malware called AdLoad....Continue Reading
The Genesis Market Place is different from any other underground market selling stolen information. It hides through the dark web’s anonymity – because this cybercriminal shop is easily accessible right through anyone’s public internet and as well as through the dark web if anyone prefers it there. On the other hand, one would need an...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.