Category

Risk and Compliance

Risk and Compliance page 1

apkpure client tampered triada malware trojan android mobile device

APKPure client app tampered by Hackers to distribute malware and trojan

One of the largest app stores outside of the Google Play Store, APKPure, was reported to have been infected with malware recently. The malware can allow hackers and threat actors to plant and distribute trojans into Android phones and other devices.  This is another supply chain attack with similarities to the recent attack on Gigaset,...
Continue Reading
ethical hackers researchers hacked indian government critical vulnerabilities flaws

Researcher team hacked Indian government websites by using exposed git and env files

Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...
Continue Reading
cybercrime work from home remote work fraud prevention vulnerability exploit

Remote work leveraged for cybercrime by adversaries in targeted attacks

Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...
Continue Reading
mobile apps location tracking personal privacy compromised data

Mobile apps location tracking is invading personal data privacy

The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...
Continue Reading
cyber technology attack lives at risk

Lives are at risk on cyber and technology attacks

Technology advancement is considered the most significant breakthrough in every institution, business, and alike. Having such elevation gives an edge to every sector that promised faster and reliable services that ease people’s lives of the burden of manual work. We are in a period heavily dependent on the comfort of these technologies but always have...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
financial services finance industry sector covid19 cyberattacks fraud prevention

Financial Services suffer cyber-attacks related to Covid19

Cybercrime has significantly increased every year, which is directly proportional to the growth of technology. Factors attributed to this increase could be summed up due to the perpetrators’ persistent behaviour through new tactics like using Covid19 as theme and sophisticated applications. Cybercriminals are being backed up by governments and the victim’s open vulnerability. Different sectors...
Continue Reading
whatsapp terms of service third party risk assessment privacy policy update

Whatsapp sharing to Third Party: Terms of Service and privacy policy update

Whatsapp the messenger and call app that was merged with Facebook through the acquisition of Facebook wants to mandate its users to accept the updated terms of service and privacy policies until February 8, 2021. In case you don’t want to accept the new terms, a user may opt to delete their accounts. The important...
Continue Reading
7 Million Indian Credit Debit Card Data Leak Dark Web

Credit and debit card data leak of 7 million Indian in the Dark Web

The current trend in the dark web highlighted data leak of almost 7 million Indian cardholders’ sensitive information that has been discovered for public view. Based on different cybersecurity organizations’ testimony on the leaked database, they confirmed that the data is as large as 2 GB and includes PAN numbers sold off in the dark...
Continue Reading
Baidu Android mobile apps compromised data

Baidu Android mobile apps caught collecting sensitive user data

The recent scanning of an app of a cybersecurity group had confirmed that the Chinese-based Baidu Android apps were accessible right at your fingertips through Google Playstore can collect sensitive information from its users. According to the report, the application Baidu Maps and Baidu Search box collect information such as Phone Model, its specification, user’s...
Continue Reading
1 2 3 5