Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...Continue Reading
A persistent malware that can survive reformats A not so new kind of threat emerged in the headlines of many cybersecurity outlets, as an expose of a persistent malware that can survive even OS reinstall is currently on the loose. Now that Malware can persist even after a reformat can be considered formidable. Beware that...Continue Reading
A massive automated hacking campaign has hit and compromised almost 2000 online stores recently that is targeted towards Magento websites aiming to steal credit card information. To the banks that issue debit and credit cards, your customers who love to online shop in the middle of the pandemic is in deeper trouble than ever...Continue Reading
The notorious Maze Ransomware group, which consists of Lock bit, Maze, and Ragnar Locker, is growing as two more gangs joined, namely Conti and SunCrypt group. Last June, the Maze malware operators publicly announced their plan to create a Ransomware Cartel, which includes other cybercrime groups to team up and share hacking exploit resources as...Continue Reading
It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...Continue Reading
A recent malware analysis report has been submitted by the US Cybersecurity and Infrastructure Security Agency (CISA) about the newly unraveled variant of an attack perpetrated by government-backed hackers from North Korea. According to their findings, the new species of malware was named ‘Blindingcan,’ in which it has believed to be more lethal and sophisticated...Continue Reading
Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...Continue Reading
A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....Continue Reading
Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...Continue Reading
Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.