Category

South Asia

South Asia Page 9

zoom end to end encryption meeting e2ee

Zoom: Stepping up by using End to End Encryption

End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...
Continue Reading
Strandhogg Vulnerability firmware bug android mobile

Strandhogg Vulnerability, the danger of using older Android firmware

Android Strandhogg is a Norwegian term referring to mistreatment by Vikings; now, it is a malware term. It was back in 2017 when the malware was first seen as an exploit in Android’s multitasking system. The malware allows malicious apps to masquerade as virtually any other Apps present on the targeted device. The base of...
Continue Reading
octopus scanner malware github repositories

Github: repositories got infected by Octopus Scanner Malware

Cybersecurity experts from a well-known open resource repository for developers – Github, announced that a backdoor malware had infected some of the uploaded projects. The backdoor malware is named Octopus Scanner. Just like this creature, single library code can tangle to multiple developed software as long as malware injects itself into the project. With its...
Continue Reading
Naikon APT Asia Pacific cyber espionage

Naikon APT – Rampant Asia Pacific cyber espionage

Naikon APT lurking in the dark  Notoriously known for their malicious attack back in 2015, a recent report from a Cybercrime Solutions researcher confirmed that the group ‘Naikon APT,’ never halted their operations but instead went under the radar for years. The group’s origins were traced back from China, specializing in intel gathering and military...
Continue Reading
dark web alert accounts for sale

Dark Web Alert: 550 Million stolen user accounts – For sale on hacking forum

Hackers and Dark Web enthusiasts are currently feasting on what data collectors consider as one of the most massive data collection sale s of the year. According to several reports, the leak includes accounts from alleged forum users. A few days ago, a hacker just posted on a hacking forum several extensive databases for sale,...
Continue Reading
symantec secure web gateware vulnerability

Symantec Secure Web Gateways: Exploited

Hoaxcalls – The unpatched vulnerability Here is the latest vulnerability news in the Cyberworld community; this has created an opportunity again for fraudsters to perform its magic . The story was about the bug found on the Symantec Secure Web Gateway version 5.0.2.8. This product reached its end-of-life (EOL) in 2015 and end-of-support-life (EOSL) in...
Continue Reading
zoom meeting outage

Meeting outage, another bomb for Zoom

Zoom meeting platform was reportedly had a global outage last Sunday. This undoubtedly affected millions of people worldwide that use the platform for Business meetings, classes, fitness activities as well as Church mass that is being used in the said platform due to the pandemic. The issue was reportedly started around 6:00 am PDT on...
Continue Reading
http status code attack rat remote access trojan

Remote access trojan attacks using remote control via HTTP status codes

Here is a brief background about a malware called COMpfun. The malware is one of those traditional RAT or Remote Access Trojan that works by infecting its target victims device – collecting system information, keystroke logging, recording snapshots of user’s desktops, among other stuff. All these acquired information uses a remotely located C&C server to...
Continue Reading
covid-19 covid19 themed phishing scheme attack antiphishing antiphishing solutions

Information-stealing trojan now disseminate via COVID-19 phishing email

As we are all still suffering COVID-19 lockdown, Cybercriminals will not stop. They are even creating different cybercriminal activities to exploit COVID-19 Pandemic. A COVID-19 themed phishing scheme was discovered by Microsoft that these cybercriminals use to target business using LokiBot – an information-stealing Trojan. LokiBot’s principal feature is to record/acquire sensitive data. This Trojan...
Continue Reading
godaddy security breach compromised data data leak

Godaddy breach: Millions of customer data are at risk!

Who uses GoDaddy? – Why you should be concerned There is the danger of going digital nowadays. It doesn’t end with private databases getting leaked. Recently the victims are Hosting and Registrar companies like Godaddy. It is as if the pie for cybercriminal activities will never be enough. Now pay attention to what you are...
Continue Reading
1 7 8 9 10 11