Category

South Asia

South Asia Page 1

Virtual machines Python ransomware campaign ESXi

Virtual machines got targeted by a new Python ransomware

Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines.  This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...
Continue Reading
bypass bug vulnerability Visa Apple Pay contactless payments

A bypass bug was found in Visa and Apple Pay in making contactless payments

A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...
Continue Reading
fake security update Android flubot malware exploit devices

A fake security update tricks Android users into downloading malware that could potentially exploit their devices

A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly.  FluBot malware can steal passwords, financial details, and more...
Continue Reading
Ransomware Healthcare Delivery Organizations cyberattacks

An onslaught of Ransomware in Healthcare Delivery Organizations might result to grave danger

IT security professionals were surveyed by a certain institution to accurately understand the ins and outs of how COVID – 19 affects healthcare delivery organizations. This survey also helps them figure out how ransomware cyberattacks on patients’ information are being kept at bay by the HDOs.  As for the research mentioned above, ransomware has already impacted healthcare organizations, causing grave...
Continue Reading
Pegasus spyware fear execution cyberattacks malware

Pegasus spyware creates fear due to being exploited in the execution of cyberattacks

Investigations have been conducted regarding the Pegasus spyware’s suspicious activities in monitoring civil rights agencies, government figures, and journalists all over the world to operate a new wave of cyberattacks.  Pegasus is a spyware system built by NSO Group that allows reading text messages, tracking calls, and more ways of harvesting information from devices. Initially, spyware is offered as a tool to combat crime;...
Continue Reading
REvil Ransomware Hong Kong Marketing Company Fimmick

REvil Ransomware Has Struck Its Latest Hong Kong Based Marketing Company

Recently, a well-known malware called REvil Ransomware has attacked Fimmick, a Hong Kong-based marketing firm. The ransomware attack has been confirmed by a British cybersecurity firm in charge of monitoring the situation.  Fimmick is a marketing firm serving high-profile companies, including McDonald’s, Shell, Asus, Coca-Cola, and others.  Currently, Fimmick’s website is down, and there are no proper...
Continue Reading
Data breach Epik 15 million customers non-customers data leak

Data breach against Epik has affected 15 million of both customers and non-customers

It is confirmed by Epik, an online service provider, that an unauthorized intrusion has indeed transpired into their systems following an incident last week where a hacker called Anonymous has leaked over 180 GB worth of stolen data from them. The threat group has even taunted Epik’s initial response to the attack by altering their official knowledge...
Continue Reading
increase open source cyberattacks popular projects cyber vulnerabilities

Yearly increase of 650% among open-source cyberattacks exposes popular projects to cyber vulnerabilities

According to security reports, the substantial continuous progress of open-source supply and demand dynamics has been recently revealed. The report shows a 650% yearly increase in supply chain attacks regarding supply chain attacks and an enthralling division between the level of known cyber vulnerabilities present in popular and non-popular versions of a project.  A survey...
Continue Reading
Over $500k stolen Singapore Banks OTP Stealing Technique

Over $500k stolen from banks with the use of OTP stealing technique

About 75 bank customers in Singapore were faked by overseas hackers to steal over $500,000 of fake credit card payments. Hijacking of OTP or one-time-password techniques that are sent through text messages by banks was implemented in this incident.  A joint statement by Infocomm Media Development Authority (IMDA), Monetary Authority of Singapore (MAS), and Singapore Police Force...
Continue Reading
Data Breaches from failures Firebase Databases

Data Breaches are triggered from failures in Firebase Databases

As the series of data breach incidents persist in the cybersecurity industry, database security has been recognized more. Even as of now, sensitive user data are still available all over the web. It seems like that the Firebase administrators are failing to abide by the protocols despite warnings and notifications to secure vital databases with passwords. Firebase...
Continue Reading
1 2 3 12