A recently discovered malware campaign has been uncovered, and they are utilizing the Ursnif Trojan for attacking Italian organizations. A few months before this latest threat attack, Ursnif malware was used against almost a hundred banks across the Italian countryside. The Ursnif Trojan Malware, also known as Gozi, Dreambot, and IFSB, is a high-risk trojan-type virus developed to record...Continue Reading
Cybersecurity researchers have identified the cybercrime group that executed the RYUK ransomware to be FIN12. RYUK ransomware targets big organizations with average revenue of at least $6 billion. Compared to other ransomware gangs, FIN12 deploys its ransomware as fast as 2.5 days. Its main targets include healthcare organizations. FIN12 is a ransomware gang that focuses on gaining a significant...Continue Reading
Recently, research revealed that two authentication bypass vulnerabilities were present in the unpatched Dahua cameras. The said vulnerabilities have a possibility of a remote attack from malicious threat actors. Meanwhile, Dahua Technology is a solution provider in the video surveillance industry. The security camera company covers various sectors such as banking and finance, industrial, retail, government,...Continue Reading
A team of researchers pursued a stealthy malware called FinFisher spyware, dubbed as FinSpy for short. Almost eight months of investigation in uncovering this 2011 malware that now packs different improvements and upgrades. What are the discoveries in this FinFisher malware? Based on the research, a highly sophisticated malware infection method is equipped in the latest version of Finspy malware. The attackers...Continue Reading
For October, Google releases the Android security updates. They address a total of 41 vulnerabilities that ranges between high and critical severity. Every fifth day of each successive month, Google releases a complete breakdown of the Android OS security patch. This also contains both framework and vendor fixes. Therefore, this update also includes the remedies for the ten...Continue Reading
Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines. This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...Continue Reading
A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...Continue Reading
A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly. FluBot malware can steal passwords, financial details, and more...Continue Reading
IT security professionals were surveyed by a certain institution to accurately understand the ins and outs of how COVID – 19 affects healthcare delivery organizations. This survey also helps them figure out how ransomware cyberattacks on patients’ information are being kept at bay by the HDOs. As for the research mentioned above, ransomware has already impacted healthcare organizations, causing grave...Continue Reading
Investigations have been conducted regarding the Pegasus spyware’s suspicious activities in monitoring civil rights agencies, government figures, and journalists all over the world to operate a new wave of cyberattacks. Pegasus is a spyware system built by NSO Group that allows reading text messages, tracking calls, and more ways of harvesting information from devices. Initially, spyware is offered as a tool to combat crime;...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.