Threat actors are continually evolving, always finding new ways to widen their reach into cyberspace. Only this time, they seemed to have turned over a new leaf – rethinking their practices, transforming themselves and their schemes into legitimate web-based services to further their malicious and fraudulent activities involving spear-phishing attacks. With all the innovative ways...Continue Reading
Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...Continue Reading
A persistent malware that can survive reformats A not so new kind of threat emerged in the headlines of many cybersecurity outlets, as an expose of a persistent malware that can survive even OS reinstall is currently on the loose. Now that Malware can persist even after a reformat can be considered formidable. Beware that...Continue Reading
A massive automated hacking campaign has hit and compromised almost 2000 online stores recently that is targeted towards Magento websites aiming to steal credit card information. To the banks that issue debit and credit cards, your customers who love to online shop in the middle of the pandemic is in deeper trouble than ever...Continue Reading
The notorious Maze Ransomware group, which consists of Lock bit, Maze, and Ragnar Locker, is growing as two more gangs joined, namely Conti and SunCrypt group. Last June, the Maze malware operators publicly announced their plan to create a Ransomware Cartel, which includes other cybercrime groups to team up and share hacking exploit resources as...Continue Reading
It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...Continue Reading
Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...Continue Reading
Browsing through the web and searching for a state-sponsored group, you will find results for this so-called The Lazarus Group. They are formerly known as APT38, God’s Apostles, God’s Disciples, Guardian of Peace, ZINC, and Team Cobra at the same time these off-shoots units called Bluenoroff and Andariel. A two pages article from the US...Continue Reading
A software that Is utilized to encrypt data is called a VPN or Virtual Private, as it travels back and forth outside your network. This software helps to provide an extra layer of security and privacy. As Ironic as it is, there were reportedly a group of free VPN providers who had their 1.2 terabytes...Continue Reading
A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.