According to the recent reports of cybersecurity researchers, threat actors broke into United Nation’s computer network and stole highly sensitive data. In addition to the reports, the breach has quickly taken place using stolen login credentials from a United Nations employee. The information about the attackers is still unidentified as of now. The hackers were able to enter the...Continue Reading
A record of nearly 500,000 login names and passwords from Fortinet VPN has been leaked by cyber attackers, wherein these details were said to have been scraped from exploitable devices in the past months. The attackers clarify that the Fortinet exploited vulnerabilities were patched and that many VPN credentials are still deemed valid. The VPN scraped credentials enable attackers to access a network to...Continue Reading
Many ransomware groups have been buying more access to potential victims’ networks through dark web marketplace and other threat groups. These gangs have been reported to analyze these “want ads” to know more clearly about the companies that ransomware groups target in executing attacks. To deploy their ransomware, threat actors should first acquire access to a company’s...Continue Reading
Fujitsu, a tech giant company, situated in Japan, has reported that a large size of their private data has been sold by an underground hacking group called Marketo throughout the dark web. The tech company stated that the risked data are mostly related to the clients and not their servers. Over 4GB of stolen data were acquired by Marketo, as they directly...Continue Reading
Recent reports have identified a new trend where cybercriminals target internet bandwidth connections to gain illegal income. This new method involves the overusing of proxyware, which has been acquiring the interest of the cybercrime industry. The Internet Bandwidth trade Honeygain and Nanowire, both internet-sharing via proxyware platforms, have recently been targeted by cybercriminals in an attempt to...Continue Reading
Last year, Google Play Store removed 17 mobile applications after being identified to be infected with the Joker malware. If a user installs one of the 17 infected apps, the Joker malware will begin to spy and steal the user’s data stored on the device. It will duplicate SMS text messages, contact lists, and more. ...Continue Reading
A brand new cyberattack scam has been invented by cybercriminals recently. They bait their targets, specifically several website owners, into accessing an infected file by sending them fake alerts and notifications saying their website is currently experiencing a DDoS attack or attack distributed denial-of-service. If the website owner opens the message sent by the threat actors, it...Continue Reading
Several attacks using the credential stuffing scheme have been reported to emerge recently by the FBI, as threat actors aimed to hijack victims’ grocery store, food delivery, and online restaurant accounts to be able to steal their sensitive financial information. This warning was sent towards the US food and agricultural firms by the Cyber Division of FBI...Continue Reading
Apple has recently released the XProtect, and antivirus technology mainly created for the YARA signature-based detection of any suspicious malware that can infect macOS. However, it has been reported that this act of Apple to potentially protect its operating system via XProtect has seemed to fail since the surfacing of a fresh variant of malware called AdLoad....Continue Reading
Recently, a new malware in the form of a Malware-as-a-Service or MaaS has been discovered by cybercrime researchers produced mainly to attack Windows. The malware is called Ficker – an info-stealer of which is distributed through Russian underground forums. In addition to this, the Russian underground forums have been suddenly surfacing many users in an @ficker profile alias, seemingly...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.