Category

Europe

Europe page 1

swarmshop hacked data 623,000 payment cards compromised data

623,000 payment cards stolen from Swarmshop, an underground community of hackers

Breaking news in the underground cybercommunity is the latest hacking incident that the Swarmshop recently experienced from an unknown adversary. Swarmshop has been active in the underground since April 2019 and had suffered a known breach in January 2020. The latest is this March. Swarmshop is an underground community specialized in hacking card details that have been...
Continue Reading
LinkedIn hacked data leak 500 million user data

LinkedIn hacked again: 500 million user data at risk

According to multiple sources, about 500 million to 550 million amount on data was leaked from LinkedIn from a notorious low-level hacking forum to a private and exclusive only data trading forum. From the low-level hacking forum, the latest LinkedIn breach is popping up for sale like crazy. One user particularly caught my attention due...
Continue Reading
facebook hacked leaked compromised data social media vulnerability exploit

Facebook Hacked… Again? Maybe we are not that surprised

Hacked and leaked, ever since the Cambridge-Analytica issue erupted, we have seen never-ending posts in the different dark web and criminal forums about data peddled for a price about Facebook. The social media giant became a target for social engineer actors from other countries and various blackhat hacking skills. This 2020, iZOOlogic downloaded leaked Facebook...
Continue Reading
izoologic dark web leaks data breach india UK africa Europe

Dark Web Leaks: iZOOlogic Security Researchers see more targeted breaches in India, South Africa and the rest of the world

The iZOOlogic security researchers recently found peculiar data leaks offered by a Data trader from a notorious forum within the dark web and another one from an exclusive membership access only forum, we see some interesting targeted breach in different countries, most noteworthy are those coming from India.    Trader selling leaked passports, IDs and...
Continue Reading
android malware system update remote access trojan spyware

Android Malware app named System Update can take complete control of victim’s device

A powerful new Android malware disguised as a crucial critical system update has been discovered by cybersecurity researchers. The malware can take complete control of a victim’s mobile device, leading to stealing personal private and financial data.     This android malware was bundled with an app named “System Update” installed outside of Google Play Store,...
Continue Reading
android mobile phone qualcomm chipset zero day vulnerability flaw

Newly disclosed Android mobile zero-day vulnerability is under active exploitation

Another disclosure to a now patched zero-day vulnerability has been made by Google, affecting those Android devices that use Qualcomm chipsets, enabling adversaries to weaponise the device in launching targeted cyberattacks. Being tracked as CVE-2020-11261 with a CVSS score of 8.4, this vulnerability concerns the “improper input validation” issue on Qualcomm Graphic chip components that...
Continue Reading
the storting norway cyberattack microsoft exchange server flaw vulnerability data breach

The Storting, Norway parliament cyberattack using Microsoft Exchange flaw

The Storting, Norway’s parliament, have suffered another cyber-attack leading to threat actors stealing data and gaining access to their network systems. This has been done using the recently disclosed Microsoft Exchange vulnerabilities.   Microsoft has recently issued an emergency out of band patch addressing the multiple zero-day exploitable vulnerabilities discovered on the Microsoft Exchange Server....
Continue Reading
google playstore play protect malware dropper Clast82 mobile app monitoring

Nine applications on Google Playstore are distributing malware dropper

Google Playstore is Google’s Official digital distribution service of Android applications. Initially, it was referred to as the Android Market and is one of the most trusted platforms used by millions of android users worldwide. Google Playstore offers various mobile applications with almost 2.9 million applications available for download and is continuously increasing with an...
Continue Reading
seo gootkit remote access trojan malware

Excellent SEO score before deploying malware to victims

Hackers and threat actors are always innovative in terms of finding new ways to deploy malware payloads. Cybersecurity researchers have recently discovered a new scheme, and they have eyed search engine optimisation or SEO techniques as another method to deliver malware and malicious scripts. Webmasters have used SEO optimisation to increase a website’s reach and...
Continue Reading
supply chain attack SITA PSS airline data breach cyber-attack

Major supply-chain attack resulted in a massive Cyberbreach of numerous Airline companies

Another significant data breach shocking the global stage is a Supply-Chain Cyberattack that managed to successfully exfiltrate data from several airlines due to its massive clientele and network of airlines from its frequent flyer program collection within its database. The concerned service provider was identified as SITA that provides IT services for the aviation industry....
Continue Reading
1 2 3 11