Category

South Asia

South Asia page 1

malware pose as legit web services spear phishing attacks cyber attack scheme campaign

Malwares posing as legit Web Services to induce spear-phishing attacks

Threat actors are continually evolving, always finding new ways to widen their reach into cyberspace. Only this time, they seemed to have turned over a new leaf – rethinking their practices, transforming themselves and their schemes into legitimate web-based services to further their malicious and fraudulent activities involving spear-phishing attacks. With all the innovative ways...
Continue Reading
joker trojan malware google play store antimalware

Joker Trojan infected apps on Google Play Store

Financial institutions, app makers, and app users closely tied to the Financial Industry must take extra precautions because maliciously scripted applications in Playstore is possible and can drain someone financially once infected with the malware such as The Joker Trojan. The Joker Trojan (also known as Bread Malware) has been recognized as one of the...
Continue Reading
persistent malware trojan survive os reformat antimalware antitrojan solutions

A Persistent Malware – surviving an OS reformat

A persistent malware that can survive reformats A not so new kind of threat emerged in the headlines of many cybersecurity outlets, as an expose of a persistent malware that can survive even OS reinstall is currently on the loose. Now that Malware can persist even after a reformat can be considered formidable. Beware that...
Continue Reading
magecart automated attack magento stores credit card skimming malware malicious scripts

Magento Stores hit by a massive automated attack

A massive automated hacking campaign has hit and compromised almost 2000 online stores recently that is targeted towards Magento websites aiming to steal credit card information.    To the banks that issue debit and credit cards, your customers who love to online shop in the middle of the pandemic is in deeper trouble than ever...
Continue Reading
maze ransomware group cartel conti suncrypt malware trojan antimalware solutions

Maze Cartel new members: Conti and SunCrypt

The notorious Maze Ransomware group, which consists of Lock bit, Maze, and Ragnar Locker, is growing as two more gangs joined, namely Conti and SunCrypt group. Last June, the Maze malware operators publicly announced their plan to create a Ransomware Cartel, which includes other cybercrime groups to team up and share hacking exploit resources as...
Continue Reading
google chrome csp vulnerability Content Security Policy

Chrome CSP bypass zero-day vulnerability – Update your web browsers

It is the best time to update your browsers to the latest available version because Cybersecurity Researchers had just disclosed a zero-day vulnerability that would enable hackers and cyber-attacks to completely bypass Content Security Policy (CSP) rules. Known as CVE-2020-6519 vulnerability, the flaw that affects Google Chrome version 84.0.4147.89 and lower would allow a remote...
Continue Reading
cyber crime covid19 advisory phishing antiphishing malware antimalware ransomware trojans fake website

Cybercrime that leverages Covid19 continues..

Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...
Continue Reading
lazarus group north korea orchestrator malware antimalware trojan hacking hackers

MATA framework campaign invoked by The Lazarus Group

Browsing through the web and searching for a state-sponsored group, you will find results for this so-called The Lazarus Group. They are formerly known as APT38, God’s Apostles, God’s Disciples, Guardian of Peace, ZINC, and Team Cobra at the same time these off-shoots units called Bluenoroff and Andariel. A two pages article from the US...
Continue Reading
free vpn provider user data breach image1

Data breach of free VPN providers expose info of millions of users

A software that Is utilized to encrypt data is called a VPN or Virtual Private, as it travels back and forth outside your network. This software helps to provide an extra layer of security and privacy. As Ironic as it is, there were reportedly a group of free VPN providers who had their 1.2 terabytes...
Continue Reading
zoom for windows unpatched critical flaw vulnerability

Unpatched critical flaw disclosed in Zoom for Windows 7 or Earlier

A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....
Continue Reading
1 2 3 4