Category

South Asia

South Asia page 1

cyber crime covid19 advisory phishing antiphishing malware antimalware ransomware trojans fake website

Cybercrime that leverages Covid19 continues..

Crimes in all forms exploit the vulnerability of another individual, be it towards a person, towards an organization, the government, or the specialized service provider. Thousands of members of the medical industry are racing to create the vaccine to ease the suffering it continuously brings around the world. We can then conclude that the attention...
Continue Reading
lazarus group north korea orchestrator malware antimalware trojan hacking hackers

MATA framework campaign invoked by The Lazarus Group

Browsing through the web and searching for a state-sponsored group, you will find results for this so-called The Lazarus Group. They are formerly known as APT38, God’s Apostles, God’s Disciples, Guardian of Peace, ZINC, and Team Cobra at the same time these off-shoots units called Bluenoroff and Andariel. A two pages article from the US...
Continue Reading
free vpn provider user data breach image1

Data breach of free VPN providers expose info of millions of users

A software that Is utilized to encrypt data is called a VPN or Virtual Private, as it travels back and forth outside your network. This software helps to provide an extra layer of security and privacy. As Ironic as it is, there were reportedly a group of free VPN providers who had their 1.2 terabytes...
Continue Reading
zoom for windows unpatched critical flaw vulnerability

Unpatched critical flaw disclosed in Zoom for Windows 7 or Earlier

A new Zero-day vulnerability of Zoom video conferencing software has been discovered by a private security company that affects Windows 7 and below Operating Systems. This newly discovered vulnerability is said to have the ability to execute arbitrary code on an unsuspecting victim that is still running an unsupported Microsoft Windows 7 OS or older....
Continue Reading
google chrome extention spyware malware malicious script

Resurgence of a more dangerous spyware in Chrome Extension

Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...
Continue Reading
google analytics hacker's tool magecart exploit

Hacker’s Analytics – How Magecart stays rampant

Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...
Continue Reading
zoom end to end encryption meeting e2ee

Zoom: Stepping up by using End to End Encryption

End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...
Continue Reading
Strandhogg Vulnerability firmware bug android mobile

Strandhogg Vulnerability, the danger of using older Android firmware

Android Strandhogg is a Norwegian term referring to mistreatment by Vikings; now, it is a malware term. It was back in 2017 when the malware was first seen as an exploit in Android’s multitasking system. The malware allows malicious apps to masquerade as virtually any other Apps present on the targeted device. The base of...
Continue Reading
octopus scanner malware github repositories

Github: repositories got infected by Octopus Scanner Malware

Cybersecurity experts from a well-known open resource repository for developers – Github, announced that a backdoor malware had infected some of the uploaded projects. The backdoor malware is named Octopus Scanner. Just like this creature, single library code can tangle to multiple developed software as long as malware injects itself into the project. With its...
Continue Reading
Naikon APT Asia Pacific cyber espionage

Naikon APT – Rampant Asia Pacific cyber espionage

Naikon APT lurking in the dark  Notoriously known for their malicious attack back in 2015, a recent report from a Cybercrime Solutions researcher confirmed that the group ‘Naikon APT,’ never halted their operations but instead went under the radar for years. The group’s origins were traced back from China, specializing in intel gathering and military...
Continue Reading
1 2 3