Category

China

China page 1

google chrome csp vulnerability Content Security Policy

Chrome CSP bypass zero-day vulnerability – Update your web browsers

It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...
Continue Reading
cyber crime covid19 advisory phishing antiphishing malware antimalware ransomware trojans fake website

Cybercrime that leverages Covid19 continues..

Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...
Continue Reading
Taidoor Malware chinese government backed hackers antimalware

Taidoor Malware – Always Repurposed

We will talk about malware that has undergone a series of modifications to stay relevant. With the collaborative effort of Cybersecurity experts from US CISA, the Federal Bureau of Investigation (FBI), and the Department of Defense (DoD), they were able to submit their concluded report for a repurposed malware that is being used by Chinese...
Continue Reading
chinese hackers indian government hong kong residents

Chinese Hackers: Cyber attacks against Indian Government and Hong Kong Residents

A newly discovered cyber attack campaign from a group of Threat Actors that originates from China has been traced to targeting Government Agencies from India and Hong Kong Residents. The attack from the Chinese Hackers were first observed in the first week of July same time that a controversial law was passed in Hong Kong...
Continue Reading
free vpn provider user data breach image1

Data breach of free VPN providers expose info of millions of users

A software that Is utilized to encrypt data is called a VPN or Virtual Private, as it travels back and forth outside your network. This software helps to provide an extra layer of security and privacy. As Ironic as it is, there were reportedly a group of free VPN providers who had their 1.2 terabytes...
Continue Reading
zoom for windows unpatched critical flaw vulnerability

Unpatched critical flaw disclosed in Zoom for Windows 7 or Earlier

A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....
Continue Reading
cyber feud china india cyber attacks website scanning phishing attacks

Cyber Feud India-China: Information Security Wars

Cybersecurity experts from Singapore have notably recorded recent attacks to India prominent ministries. The said security firm seen the offensive in cyberspace after running their standard website scanning, targeting mainly the Ministries of Defense, Foreign Affairs, and Information & Broadcasting. Second to these are well-known companies such as Reliance Jio, Airtel, BSNL, Micromax, Cipla, Sun...
Continue Reading
google chrome extention spyware malware malicious script

Resurgence of a more dangerous spyware in Chrome Extension

Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...
Continue Reading
google analytics hacker's tool magecart exploit

Hacker’s Analytics – How Magecart stays rampant

Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...
Continue Reading
zoom end to end encryption meeting e2ee

Zoom: Stepping up by using End to End Encryption

End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...
Continue Reading
1 2 3