UK page 1

oxford server office 365 phishing attack cyberattack

Office 365 phishing attacks utilizes servers from Oxford

Since many businesses use the Windows platform, incorporating the O365 applications, including emails, is an excellent move for each organization in managing their data and communication services. Not only is it a cost-effective move, but this also promises ease on the production system and organizing information throughout the infrastructure. Having this application or subscription in...
Continue Reading
google chrome extention spyware malware malicious script

Resurgence of a more dangerous spyware in Chrome Extension

Buzzing news from a threat intelligence firm released recently about Google Chrome browser crawling with Spyware that blends onto their browser extension. Speculations that these rupture in the Chrome extension targeted sectors ranging from financial, healthcare, and government organization. With almost 32 million recorded downloads of this fake extension, this is a report that cannot...
Continue Reading
healthcare organization pos system ransomware hacker group revil

A New Notorious Ransomware targets POS Systems

Cybersecurity experts from a renowned Threat Intelligence team had recently spotted the new cybergang REvil (also known as Sodinokibi) activity after it exposed itself while trying to put their paws on the Point of Sale or POS systems on one of its targeted victims. The targeted business was said to be a healthcare organization that...
Continue Reading
google analytics hacker's tool magecart exploit

Hacker’s Analytics – How Magecart stays rampant

Another hot plate dish on Magecart where Cybersecurity experts have recently exposed activities concerning online stores. This new rupture is targeting e-commerce companies to stealthily steal credit card information for people that make purchases through stores online. This activity can bypass the multi-layered security protocol called Content Security Policy (CSP), which is imposed by hosts...
Continue Reading
zoom end to end encryption meeting e2ee

Zoom: Stepping up by using End to End Encryption

End to End Encryption will be available to Zoom users Zoom is now one of the most used video conferencing software because of the new normal set up that we need to adapt. The company has finally announced that it will offer more robust security encryption for all Zoom users paid or free. The sought-after...
Continue Reading
Strandhogg Vulnerability firmware bug android mobile

Strandhogg Vulnerability, the danger of using older Android firmware

Android Strandhogg is a Norwegian term referring to mistreatment by Vikings; now, it is a malware term. It was back in 2017 when the malware was first seen as an exploit in Android’s multitasking system. The malware allows malicious apps to masquerade as virtually any other Apps present on the targeted device. The base of...
Continue Reading
octopus scanner malware github repositories

Github: repositories got infected by Octopus Scanner Malware

Cybersecurity experts from a well-known open resource repository for developers – Github, announced that a backdoor malware had infected some of the uploaded projects. The backdoor malware is named Octopus Scanner. Just like this creature, single library code can tangle to multiple developed software as long as malware injects itself into the project. With its...
Continue Reading
credit card dark web leak

Over 80k Credit Card info are up for sale in the Dark Web

Recently, detailed information of over 80,000 credit cards discovered is being sold in the Dark web. As per the Security firm that created the leak, cyber-criminals obtained the credit card details from various countries that include the US, France, Australia, and India. These credit cards include both Visa and Mastercard.   The country classification is...
Continue Reading
european supercomputers hijacked cryptocurrency malware ransomware antimalware trojan

Cyber attack in Europe: Supercomputers hijacked over cryptocurrency mining

A large number of Supercomputers owned by a European supercomputing firm was just taken over by hackers a few days ago. These supercomputers, located in different countries all over Europe, was commissioned by different government agencies and healthcare organizations in cooperation with the National Cyber Security Centre in UK for Covid-19 research and development. According...
Continue Reading
European Parliament data breach data leak compromised data

European Parliament members become the target in major data breach

A collection of private and sensitive information of more than a thousand members, including staff of the European Parliament was leaked and left exposed in what can only be considered a huge data breach on the European organization’s domain. As reported over the weekend, the leaked data allegedly includes about 1,200 accounts of parliament officials,...
Continue Reading
1 2 3 4