Category

China

China Page 1

DNS Attacks Cyber threat domain name system DNSSEC Vulnerabilities

Survey reveals that DNS cyberattacks pose major threats to organisations

Cybersecurity leaders have conducted a study that shows the alarming hike of domain name system (DNS) attacks against organisations for 2021. The survey result revealed that within the past 12 months, 72% of participants had experienced a DNS cyberattack.   61% of victimised organisations have suffered from multiple attacks, while 11% are attacked regularly. In terms of cyberattack recovery, one-third of the respondents said...
Continue Reading
Thai hotel chain data breach Desorden Group Hackers

A Thai hotel chain suffered from a data breach claimed by Desorden Group

A Thai luxury hotel chain, Centara Hotels & Resort, has recently published a statement regarding a data breach suspected of being performed by a notorious group of threat actors behind a series of cyberattacks in the past weeks.  Through the security team’s investigation, it was verified that the system of the luxury hotel chain had suffered a data breach, and the threat actors were able to access some customers’...
Continue Reading
3 Bugs 41 vulnerabilities fix Android mobile phone Security Update

3 Bug fixes and almost 41 vulnerabilities found in this month’s Android Security Update

For October, Google releases the Android security updates. They address a total of 41 vulnerabilities that ranges between high and critical severity.  Every fifth day of each successive month, Google releases a complete breakdown of the Android OS security patch. This also contains both framework and vendor fixes. Therefore, this update also includes the remedies for the ten...
Continue Reading
Virtual machines Python ransomware campaign ESXi

Virtual machines got targeted by a new Python ransomware

Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines.  This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...
Continue Reading
bypass bug vulnerability Visa Apple Pay contactless payments

A bypass bug was found in Visa and Apple Pay in making contactless payments

A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...
Continue Reading
fake security update Android flubot malware exploit devices

A fake security update tricks Android users into downloading malware that could potentially exploit their devices

A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly.  FluBot malware can steal passwords, financial details, and more...
Continue Reading
increase open source cyberattacks popular projects cyber vulnerabilities

Yearly increase of 650% among open-source cyberattacks exposes popular projects to cyber vulnerabilities

According to security reports, the substantial continuous progress of open-source supply and demand dynamics has been recently revealed. The report shows a 650% yearly increase in supply chain attacks regarding supply chain attacks and an enthralling division between the level of known cyber vulnerabilities present in popular and non-popular versions of a project.  A survey...
Continue Reading
Data Breaches from failures Firebase Databases

Data Breaches are triggered from failures in Firebase Databases

As the series of data breach incidents persist in the cybersecurity industry, database security has been recognized more. Even as of now, sensitive user data are still available all over the web. It seems like that the Firebase administrators are failing to abide by the protocols despite warnings and notifications to secure vital databases with passwords. Firebase...
Continue Reading
Social media North Korea hacker group Kumsong 121

Social media used by North Korea’s hacker group Kumsong 121 in executing cyberattack

Kumsong 121, a group of hackers from North Korea, has recently executed a cyberattack with social media. Researchers warn cellphone and computer users to be cautious since the hacking and attacks from North Korea have been growing and becoming more sophisticated.  A cybersecurity researcher reported that they have detected a new and advanced persistent threat or APT through a...
Continue Reading
500000 Fortinet VPN credentials leaked cyber attackers dark web hacker forum

500,000 Fortinet VPN credentials are leaked by cyber attackers

A record of nearly 500,000 login names and passwords from Fortinet VPN has been leaked by cyber attackers, wherein these details were said to have been scraped from exploitable devices in the past months. The attackers clarify that the Fortinet exploited vulnerabilities were patched and that many VPN credentials are still deemed valid.  The VPN scraped credentials enable attackers to access a network to...
Continue Reading
1 2 3 8