China page 2

ransomware cartels double extortion fraud prevention

The double extortion trend that ransomware cartels utilize to coerce businesses

Ransomware has indeed become its own industry and has come a long way. From the early days with the AIDS Trojan to the current more modern, unique and business-like model Ransomware-as-a-Service preys on companies and organizations worldwide. There is a new ransomware technique being played by the adversaries called ‘double extortion’. They lock their victims’...
Continue Reading
logokit fake pages real-time phishing tool antiphishing

LogoKit, new phishing page building tool creates fake webpages real-time

A new phishing tool variant has been unravelled by cybersecurity researchers that ran rampant globally in the past months. The researcher’s statistics report shows that LogoKit has already been seen on more than 700 sites in the past few months and more than 300 domains a few weeks ago. The phishing tool is said to...
Continue Reading
solarwinds repositories source code leaked data sale dark web

Solarwinds and other repositories leaked data for sale

We have been consistently checking the SolarWinds hack incident since it erupted. Part of our monitoring includes consistent scans to known and infamous dark web forums that currently exist on the web. Through different media, researchers and our search, we also found and confirmed a website calling itself ‘SolarLeaks’. In December 2020, SolarWinds disclosed that...
Continue Reading
200 Million Chinese citizens dark web data leak

Data leak of over 200 Million Chinese citizens for sale within the Dark Web

A routine monitoring check within the Dark Web revealed multiple posts on a hacking forum where threat actor/s are offering alleged leaked data of Chinese citizens. The data probably posted were stolen from numerous famous Chinese services websites such as Gong’an County government site, QQ and Weibo. One threat actor offer free sample data of...
Continue Reading
event of Data Breach Older Software Money Loss Enterprises Company

Enterprises using older Software equates to more Money Loss in the event of a Data Breach

Statistics from Kaspersky says that a higher loss rate of 47% in financial aspect is evident compared to those using the new ones in case a data breach happens, this is according to their research. An almost 50% higher loss rate is already a big blow than more sophisticated systems that got breached. Therefore, we...
Continue Reading
Credit Card Stealer Scripts Online Stores Magecart

Credit card stealer script on Online Store Payment Page

Nowadays, people have 2 (two) payment experience, either you go physically to the store or shop online. Paying online is becoming a trend across several companies. As the company expands its business in e-commerce, the businesses provide their customer with a seamless experience by offering different methods of online payments. The methods are credit or...
Continue Reading
Office 365 Executive Login For Sale Russian Forum Compromised Data

Microsoft Office 365 login of C Level Executives being sold

The black market is now on a feast for the latest sale craze happening on a Russian exclusive forum Based on the news, an anonymous hacker is currently selling Office 365 email logins of hundreds of high-ranking executives of prominent businesses across the globe. The price usually ranging from 100 USD to 1500 USD...
Continue Reading
CName Misconfiguration Subdomain Hijack Abuse DNS

CName Misconfiguration left thousands of companies open to attack

A recent web security scanning by a cybersecurity group confirmed that over 400,000 subdomains that have been abandoned are susceptible to malicious takeover invasion of many threat actors. According to the report, these abandoned subdomains result from misconfigured CName (canonical name) in the DNS layout of the hosting provider. The CName configuration is widely used...
Continue Reading
Zerologon Vulnerability APT10 hackers hacking group

APT10 targeting businesses on a global scale using Zerologon Vulnerability

A widespread and highly persistent cyber-attack has been discovered by security researchers. The series of assaults conducted by APT10 hacking group were found to have been leveraging the Zerologon vulnerability of Windows, targeting mostly Japanese firms but has connections to attacks happening in more than 17 territories around the world. No particular industry was targeted,...
Continue Reading
pharma companies mobile phishing campaign spear-phishing antiphishing

Pharma companies targeted by Mobile Phishing campaigns

A recent Threat Report and Assessment from leading security researchers revealed a growing threat. An in-depth analysis shows hackers prefer pharmaceutical companies over other industries as the target of choice for spear-phishing campaigns. Over the last decade, threat actors have been known to focus their efforts on large companies, both private and government-owned, because they’ve...
Continue Reading
1 2 3 4 6