Category

Central Asia

Central Asia page 1

maze ransomware group cartel conti suncrypt malware trojan antimalware solutions

Maze Cartel new members: Conti and SunCrypt

The notorious Maze Ransomware group, which consists of Lock bit, Maze, and Ragnar Locker, is growing as two more gangs joined, namely Conti and SunCrypt group. Last June, the Maze malware operators publicly announced their plan to create a Ransomware Cartel, which includes other cybercrime groups to team up and share hacking exploit resources as...
Continue Reading
google chrome csp vulnerability Content Security Policy

Chrome CSP bypass zero-day vulnerability – Update your web browsers

It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...
Continue Reading
cyber crime covid19 advisory phishing antiphishing malware antimalware ransomware trojans fake website

Cybercrime that leverages Covid19 continues..

Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...
Continue Reading
chinese hackers indian government hong kong residents

Chinese Hackers: Cyber attacks against Indian Government and Hong Kong Residents

A newly discovered cyber attack campaign from a group of Threat Actors that originates from China has been traced to targeting Government Agencies from India and Hong Kong Residents. The attack from the Chinese Hackers were first observed in the first week of July same time that a controversial law was passed in Hong Kong...
Continue Reading
zoom for windows unpatched critical flaw vulnerability

Unpatched critical flaw disclosed in Zoom for Windows 7 or Earlier

A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....
Continue Reading
cyber feud china india cyber attacks website scanning phishing attacks

Cyber Feud India-China: Information Security Wars

Cybersecurity experts from Singapore have notably recorded recent attacks to India prominent ministries. The said security firm seen the offensive in cyberspace after running their standard website scanning, targeting mainly the Ministries of Defense, Foreign Affairs, and Information & Broadcasting. Second to these are well-known companies such as Reliance Jio, Airtel, BSNL, Micromax, Cipla, Sun...
Continue Reading
google chrome extention spyware malware malicious script

Resurgence of a more dangerous spyware in Chrome Extension

Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...
Continue Reading
google analytics hacker's tool magecart exploit

Hacker’s Analytics – How Magecart stays rampant

Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...
Continue Reading
zoom end to end encryption meeting e2ee

Zoom: Stepping up by using End to End Encryption

End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...
Continue Reading
Strandhogg Vulnerability firmware bug android mobile

Strandhogg Vulnerability, the danger of using older Android firmware

Android Strandhogg is a Norwegian term referring to mistreatment by Vikings; now, it is a malware term. It was back in 2017 when the malware was first seen as an exploit in Android’s multitasking system. The malware allows malicious apps to masquerade as virtually any other Apps present on the targeted device. The base of...
Continue Reading
1 2 3 4