The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records. Health insurers or related...Continue Reading
A surge of cyberattacks on cryptocurrency businesses has been seen recently by the cybersecurity community. We all know that cryptocurrencies are fully decentralized. They have no authority that monitors crypto activities and transactions, which provides a free hand to threat actors to conduct attacks at their will. This fact, in addition to the soaring value...Continue Reading
Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...Continue Reading
A 50,000 USD reward program recently made a noise because it was awarded to an independent researcher who submitted a vulnerability found on Microsoft and Instagram accounts to bypass the mentioned platform’s account recovery program service. Despite its high-level security to avoid such intrusion on their user’s account, the researcher was able to crack the...Continue Reading
The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...Continue Reading
Launched amidst the pandemic in March 2020 with only 1500 users and a net worth of USD 100 million, the Clubhouse app soared up the digital market with a current count of estimated 10 million users and worth USD 1 billion in just 11 months aside from other found funding. The app became famous as...Continue Reading
The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...Continue Reading
Cybercrime has significantly increased every year, which is directly proportional to the growth of technology. Factors attributed to this increase could be summed up due to the perpetrators’ persistent behaviour through new tactics like using Covid19 as theme and sophisticated applications. Cybercriminals are being backed up by governments and the victim’s open vulnerability. Different sectors...Continue Reading
With the growing followers of cryptocurrency, adversaries use different tactics to perform illegal mining activities to profit via cryptojacking. With the performance requirements needed by a database, riding to it is a great advantage that the ingenious MrbMiners has exploited. By targeting many Microsoft SQL servers via brute-force attacks, MrbMiner placed their group in the...Continue Reading
New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection. According to the report, the attack was orchestrated to the group forum of IOBit...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.