Category

Russia

Russia page 1

joker trojan malware google play store antimalware

Joker Trojan infected apps on Google Play Store

Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...
Continue Reading
persistent malware trojan survive os reformat antimalware antitrojan solutions

A Persistent Malware – surviving an OS reformat

A persistent malware that can survive reformats A not so new kind of threat emerged in the headlines of many cybersecurity outlets, as an expose of a persistent malware that can survive even OS reinstall is currently on the loose. Now that Malware can persist even after a reformat can be considered formidable. Beware that...
Continue Reading
magecart automated attack magento stores credit card skimming malware malicious scripts

Magento Stores hit by a massive automated attack

A massive automated hacking campaign has hit and compromised almost 2000 online stores recently that is targeted towards Magento websites aiming to steal credit card information.    To the banks that issue debit and credit cards, your customers who love to online shop in the middle of the pandemic is in deeper trouble than ever...
Continue Reading
maze ransomware group cartel conti suncrypt malware trojan antimalware solutions

Maze Cartel new members: Conti and SunCrypt

The notorious Maze Ransomware group, which consists of Lock bit, Maze, and Ragnar Locker, is growing as two more gangs joined, namely Conti and SunCrypt group. Last June, the Maze malware operators publicly announced their plan to create a Ransomware Cartel, which includes other cybercrime groups to team up and share hacking exploit resources as...
Continue Reading
google chrome csp vulnerability Content Security Policy

Chrome CSP bypass zero-day vulnerability – Update your web browsers

It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...
Continue Reading
blindingcan malware trojan rat remote access trojan north korea

Defense on North Korean Blindingcan Malware

A recent malware analysis report has been submitted by the US Cybersecurity and Infrastructure Security Agency (CISA) about the newly unraveled variant of an attack perpetrated by government-backed hackers from North Korea. According to their findings, the new species of malware was named ‘Blindingcan,’ in which it has believed to be more lethal and sophisticated...
Continue Reading
cyber crime covid19 advisory phishing antiphishing malware antimalware ransomware trojans fake website

Cybercrime that leverages Covid19 continues..

Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...
Continue Reading
zoom for windows unpatched critical flaw vulnerability

Unpatched critical flaw disclosed in Zoom for Windows 7 or Earlier

A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....
Continue Reading
google chrome extention spyware malware malicious script

Resurgence of a more dangerous spyware in Chrome Extension

Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...
Continue Reading
google analytics hacker's tool magecart exploit

Hacker’s Analytics – How Magecart stays rampant

Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...
Continue Reading
1 2 3