A new type of hack to exploit cash cards has been disclosed by cybersecurity researchers that allow cybercriminals to trick and bypass POS terminals to enable a transaction to use a victim’s Mastercard contactless card functioning as a Visa card. A group of academic researchers delved into demonstrating a PIN bypass hack that permits threat...Continue Reading
A phishing attack is one of the significant threats that individuals and companies faced. With the pandemic crisis and people are on edge, cybercriminals are eager to achieve a higher number of success with their phishing campaigns. Last year was a year of phishing sites. A multinational technology company detected a high record of around...Continue Reading
A recent phishing campaign has been rediscovered victimizing again Facebook users. The said modus has been around since 2017 and repurposed with the same tactic has been spotted since then. This new operation is believed to have resurfaced in January 2020 and targets users mainly from Germany and some more from different locations worldwide. Based...Continue Reading
Following the noise created in 2017, an unknown adversary again published an enormous collection of compromised email credentials with a password with a total count of over 3.2 billion doubling the number from the previous collection of 1.4 billion. Tagged as Compilation of Many Breaches (COMB), the collection of credentials consists of breaches from the...Continue Reading
Ransomware has indeed become its own industry and has come a long way. From the early days with the AIDS Trojan to the current more modern, unique and business-like model Ransomware-as-a-Service preys on companies and organizations worldwide. There is a new ransomware technique being played by the adversaries called ‘double extortion’. They lock their victims’...Continue Reading
Chinese hackers are being suspected of exploiting a vulnerability of software made by SolarWinds that enabled the threat actors to break into US government computers last year, as stated by five people familiar with the cyberattacks. This marks another angle on the cybersecurity breach trail that United States Lawmakers labelled ‘national security emergency’. Two people...Continue Reading
A newly detected persistent threat attack group with probable ties to Hezbollah has been using a ‘retooled’ version of its malware with a new version of remote access trojan or RAT to penetrate organisations’ cyber defences worldwide aiming to exfiltrate valuable data. On a recent report published by a security research team last Thursday, the...Continue Reading
Adversaries behind the Dridex trojan malware have recently resurfaced exploiting the current event’s theme to lure their victim with more sophisticated revision. Dridex Trojan malware has been in circulation and doing its malicious activity since 2011. The malware specialized in targeting the Windows system and especially the victim’s banking credentials. It can also act as...Continue Reading
Cybersecurity vendors such as FireEye, Fidelis, Crowdstrike, Malwarebytes, Palo Alto Networks, and Qualys have confirmed that they have been targeted by the threat actors behind the SolarWinds supply-chain attack. Recently, Mimecast confirmed a security breach from the same threat actors involved in the SolarWinds incident. Mimecast is a well-known cybersecurity company for providing cloud-based email...Continue Reading
A new phishing tool variant has been unravelled by cybersecurity researchers that ran rampant globally in the past months. The researcher’s statistics report shows that LogoKit has already been seen on more than 700 sites in the past few months and more than 300 domains a few weeks ago. The phishing tool is said to...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.