Category

South Asia

South Asia page 1

Naikon APT Asia Pacific cyber espionage

Naikon APT – Rampant Asia Pacific cyber espionage

Naikon APT lurking in the dark  Notoriously known for their malicious attack back in 2015, a recent report from a Cybercrime Solutions researcher confirmed that the group ‘Naikon APT,’ never halted their operations but instead went under the radar for years. The group’s origins were traced back from China, specializing in intel gathering and military...
Continue Reading
dark web alert accounts for sale

Dark Web Alert: 550 Million stolen user accounts – For sale on hacking forum

Hackers and Dark Web enthusiasts are currently feasting on what data collectors consider as one of the most massive data collection sale s of the year. According to several reports, the leak includes accounts from alleged forum users. A few days ago, a hacker just posted on a hacking forum several extensive databases for sale,...
Continue Reading
symantec secure web gateware vulnerability

Symantec Secure Web Gateways: Exploited

Hoaxcalls – The unpatched vulnerability Here is the latest vulnerability news in the Cyberworld community; this has created an opportunity again for fraudsters to perform its magic . The story was about the bug found on the Symantec Secure Web Gateway version 5.0.2.8. This product reached its end-of-life (EOL) in 2015 and end-of-support-life (EOSL) in...
Continue Reading
zoom meeting outage

Meeting outage, another bomb for Zoom

Zoom meeting platform was reportedly had a global outage last Sunday. This undoubtedly affected millions of people worldwide that use the platform for Business meetings, classes, fitness activities as well as Church mass that is being used in the said platform due to the pandemic. The issue was reportedly started around 6:00 am PDT on...
Continue Reading
http status code attack rat remote access trojan

Remote access trojan attacks using remote control via HTTP status codes

Here is a brief background about a malware called COMpfun. The malware is one of those traditional RAT or Remote Access Trojan that works by infecting its target victims device – collecting system information, keystroke logging, recording snapshots of user’s desktops, among other stuff. All these acquired information uses a remotely located C&C server to...
Continue Reading
covid-19 covid19 themed phishing scheme attack antiphishing antiphishing solutions

Information-stealing trojan now disseminate via COVID-19 phishing email

As we are all still suffering COVID-19 lockdown, Cybercriminals will not stop. They are even creating different cybercriminal activities to exploit COVID-19 Pandemic. A COVID-19 themed phishing scheme was discovered by Microsoft that these cybercriminals use to target business using LokiBot – an information-stealing Trojan. LokiBot’s principal feature is to record/acquire sensitive data. This Trojan...
Continue Reading
godaddy security breach compromised data data leak

Godaddy breach: Millions of customer data are at risk!

Who uses GoDaddy? – Why you should be concerned There is the danger of going digital nowadays. It doesn’t end with private databases getting leaked. Recently the victims are Hosting and Registrar companies like Godaddy. It is as if the pie for cybercriminal activities will never be enough. Now pay attention to what you are...
Continue Reading
digital ocean data leak incident compromised data

DigitalOcean leaks: How severe was the exposure?

One of the biggest web hosting platforms, DigitalOcean, has reportedly suffered a data leak incident that exposed some of their customer’s data. The data leak was reportedly occurred due to an Internal document of DigitalOcean that was inadvertently left accessible online. It was reported that an employee had accidentally made the Internal document available online...
Continue Reading
lock bit ransomware

Lock Bit Ransomware: Too quick to spread on 225 systems

Too Quick But True Lock bit Ransomware, since its release last year of September 2019, is making its name towards the hacking community. The program targets corporate networks to infiltrate their stronghold and for the attacker to demand a large amount of money on their target. This program was well known as a service since...
Continue Reading
wordpress code injection vulnerabilities software vulnerability

Another WordPress Site Blunder: Vulnerabilities are likely to target 900,000 sites per week

Are you setting up a WordPress site for business? If you have a WordPress site setup for your promotion or worse eCommerce site, then you are in for a significant risk. Vulnerabilities are surrounding the said platform; these vulnerabilities are pretty much the new normal since the launch of WordPress If you want to boost...
Continue Reading
1 2