Category

Russia

Russia page 1

event of Data Breach Older Software Money Loss Enterprises Company

Enterprises using older Software equates to more Money Loss in the event of a Data Breach

Statistics from Kaspersky says that a higher loss rate of 47% in financial aspect is evident compared to those using the new ones in case a data breach happens, this is according to their research. An almost 50% higher loss rate is already a big blow than more sophisticated systems that got breached. Therefore, we...
Continue Reading
Credit Card Stealer Scripts Online Stores Magecart

Credit card stealer script on Online Store Payment Page

Nowadays, people have 2 (two) payment experience, either you go physically to the store or shop online. Paying online is becoming a trend across several companies. As the company expands its business in e-commerce, the businesses provide their customer with a seamless experience by offering different methods of online payments. The methods are credit or...
Continue Reading
Office 365 Executive Login For Sale Russian Forum Compromised Data

Microsoft Office 365 login of C Level Executives being sold

The black market is now on a feast for the latest sale craze happening on a Russian exclusive forum Exploit.in. Based on the news, an anonymous hacker is currently selling Office 365 email logins of hundreds of high-ranking executives of prominent businesses across the globe. The price usually ranging from 100 USD to 1500 USD...
Continue Reading
CName Misconfiguration Subdomain Hijack Abuse DNS

CName Misconfiguration left thousands of companies open to attack

A recent web security scanning by a cybersecurity group confirmed that over 400,000 subdomains that have been abandoned are susceptible to malicious takeover invasion of many threat actors. According to the report, these abandoned subdomains result from misconfigured CName (canonical name) in the DNS layout of the hosting provider. The CName configuration is widely used...
Continue Reading
dark side of online shopping exploits threats risks vulnerabilities

The dark side of online shopping: Vulnerabilities, exploits, threats, and risks

Online shopping is part of the new normal. With the pandemic catastrophe that we are facing, physical stores are moving their products online. Great deals and offers are widely marketed online via various shopping websites. Black Friday, Cyber Monday, Cyber Week, Free shipping day, and Super Saturday are just some of the companies’ discounts during...
Continue Reading
magento magecart attack malicious script credit card skimmer

Hackers attacked E-Shop Retailers operating outmoded Magento software

Security researchers have recently uncovered a sudden surge in cybercriminal activities involving several online businesses, more than 2800+, to be exact.   These e-commerce merchants have one thing in common – they are all running an outdated version of the Magento platform.   Since September, the attacks have been going on. That’s why security researchers...
Continue Reading
Network Access Academic Firms for sale Dark Web

Network access of 7000+ Academic Firms for sale on the Dark Web

A group of hackers just posted a “For Sale” notice over several Russian Dark Web forums. The sale involved access to the networks of over 7000+ organizations, the majority of which are educational institutions. From local government agencies, entertainment websites, bars, and other business websites, you name it, and the list goes on. The one...
Continue Reading
nitro software hacked compromised data breach dark web market

Nitro Software Hacked! Client and user data compromised

Nitro Software Inc., an Australian tech software company that provides document productivity and cloud services to its users and Fortune 500 clients, just got hacked. Known worldwide as the alternative provider of document productivity products – other than Adobe Acrobat, Nitro became one of the leaders in the PDF industry and digital transformation. It has...
Continue Reading
joker trojan malware google play store antimalware

Joker Trojan infected apps on Google Play Store

Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...
Continue Reading
persistent malware trojan survive os reformat antimalware antitrojan solutions

A Persistent Malware – surviving an OS reformat

A persistent malware that can survive reformats A not so new kind of threat emerged in the headlines of many cybersecurity outlets, as an expose of a persistent malware that can survive even OS reinstall is currently on the loose. Now that Malware can persist even after a reformat can be considered formidable. Beware that...
Continue Reading
1 2 3 4