Category

North America

North America page 1

google alerts fake adobe flash player update malware spyware campaign

Google Alerts used on campaign to push fake Adobe Flash Player update

For better customization and personalization of accounts, Google launched the Google Alerts service feature to provide email or RSS (Really Simple Syndication) feed to its users on the latest and hottest news about a specific keyword or topic of user’s interest that tops or adds on the Google search index. As an easy to use...
Continue Reading
hack MasterCard PIN bypass VisaCard cash card

New hack allow cyber-attackers to do MasterCard PIN bypass when using a Visa Card

A new type of hack to exploit cash cards has been disclosed by cybersecurity researchers that allow cybercriminals to trick and bypass POS terminals to enable a transaction to use a victim’s Mastercard contactless card functioning as a Visa card. A group of academic researchers delved into demonstrating a PIN bypass hack that permits threat...
Continue Reading
phishers linkedin phishing attack social media fake login page

Phishers are now using the LinkedIn platform for a phishing attack

A phishing attack is one of the significant threats that individuals and companies faced. With the pandemic crisis and people are on edge, cybercriminals are eager to achieve a higher number of success with their phishing campaigns. Last year was a year of phishing sites. A multinational technology company detected a high record of around...
Continue Reading
malware adware phishing campaign facebook messenger social media

Phishing campaign against Facebook users

A recent phishing campaign has been rediscovered victimizing again Facebook users. The said modus has been around since 2017 and repurposed with the same tactic has been spotted since then. This new operation is believed to have resurfaced in January 2020 and targets users mainly from Germany and some more from different locations worldwide. Based...
Continue Reading
compilation of data breaches largest collection of leaked data comb

Compilation of Many Breaches, largest collection of leaked email and credentials for free

Following the noise created in 2017, an unknown adversary again published an enormous collection of compromised email credentials with a password with a total count of over 3.2 billion doubling the number from the previous collection of 1.4 billion. Tagged as Compilation of Many Breaches (COMB), the collection of credentials consists of breaches from the...
Continue Reading
ransomware cartels double extortion fraud prevention

The double extortion trend that ransomware cartels utilize to coerce businesses

Ransomware has indeed become its own industry and has come a long way. From the early days with the AIDS Trojan to the current more modern, unique and business-like model Ransomware-as-a-Service preys on companies and organizations worldwide. There is a new ransomware technique being played by the adversaries called ‘double extortion’. They lock their victims’...
Continue Reading
hezbollah hacking group Lebanese Cedar Cyberespionage telecom hosting ISP

Hezbollah hacking group targeted Telecoms, Hosting, ISPs Worldwide

A newly detected persistent threat attack group with probable ties to Hezbollah has been using a ‘retooled’ version of its malware with a new version of remote access trojan or RAT to penetrate organisations’ cyber defences worldwide aiming to exfiltrate valuable data. On a recent report published by a security research team last Thursday, the...
Continue Reading
dridex trojan malware amazon giftcard email campaign

Fake Amazon giftcards sent with Dridex Malware

Adversaries behind the Dridex trojan malware have recently resurfaced exploiting the current event’s theme to lure their victim with more sophisticated revision. Dridex Trojan malware has been in circulation and doing its malicious activity since 2011. The malware specialized in targeting the Windows system and especially the victim’s banking credentials. It can also act as...
Continue Reading
mimecast security breach threat actors solarwinds

Threat actors behind SolarWinds security breach now attack Mimecast

Cybersecurity vendors such as FireEye, Fidelis, Crowdstrike, Malwarebytes, Palo Alto Networks, and Qualys have confirmed that they have been targeted by the threat actors behind the SolarWinds supply-chain attack. Recently, Mimecast confirmed a security breach from the same threat actors involved in the SolarWinds incident. Mimecast is a well-known cybersecurity company for providing cloud-based email...
Continue Reading
logokit fake pages real-time phishing tool antiphishing

LogoKit, new phishing page building tool creates fake webpages real-time

A new phishing tool variant has been unravelled by cybersecurity researchers that ran rampant globally in the past months. The researcher’s statistics report shows that LogoKit has already been seen on more than 700 sites in the past few months and more than 300 domains a few weeks ago. The phishing tool is said to...
Continue Reading
1 2 3 9