Category

Third Party Risk Assessment

Third Party Risk Assessment page 1

cyber threat attacks customer data theft US Health Insurance Industry 

Increasing risk of customer data theft on US Health Insurance industry 

The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records.  Health insurers or related...
Continue Reading
cryptojacking malware cryptocurrency mining malware botnet

Cryptocurrency mining attacks and crypto-jacking on businesses on the rise again

A surge of cyberattacks on cryptocurrency businesses has been seen recently by the cybersecurity community. We all know that cryptocurrencies are fully decentralized. They have no authority that monitors crypto activities and transactions, which provides a free hand to threat actors to conduct attacks at their will. This fact, in addition to the soaring value...
Continue Reading
ethical hackers researchers hacked indian government critical vulnerabilities flaws

Researcher team hacked Indian government websites by using exposed git and env files

Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...
Continue Reading
microsoft instagram vulnerability bug bounty reward program ethical hacking

$50,000 reward for bug that could have allowed access to your Microsoft account

A 50,000 USD reward program recently made a noise because it was awarded to an independent researcher who submitted a vulnerability found on Microsoft and Instagram accounts to bypass the mentioned platform’s account recovery program service. Despite its high-level security to avoid such intrusion on their user’s account, the researcher was able to crack the...
Continue Reading
mobile apps location tracking personal privacy compromised data

Mobile apps location tracking is invading personal data privacy

The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...
Continue Reading
clubhouse social media app chinese government compromised data agora inc

Clubhouse social media app might be leaking data to Chinese Government

Launched amidst the pandemic in March 2020 with only 1500 users and a net worth of USD 100 million, the Clubhouse app soared up the digital market with a current count of estimated 10 million users and worth USD 1 billion in just 11 months aside from other found funding. The app became famous as...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
financial services finance industry sector covid19 cyberattacks fraud prevention

Financial Services suffer cyber-attacks related to Covid19

Cybercrime has significantly increased every year, which is directly proportional to the growth of technology. Factors attributed to this increase could be summed up due to the perpetrators’ persistent behaviour through new tactics like using Covid19 as theme and sophisticated applications. Cybercriminals are being backed up by governments and the victim’s open vulnerability. Different sectors...
Continue Reading
cryptojacking MrbMiner botnet Iran Vihansoft trojan Iran

MrbMiner botnet traced back to Iranian software company

With the growing followers of cryptocurrency, adversaries use different tactics to perform illegal mining activities to profit via cryptojacking. With the performance requirements needed by a database, riding to it is a great advantage that the ingenious MrbMiners has exploited. By targeting many Microsoft SQL servers via brute-force attacks, MrbMiner placed their group in the...
Continue Reading
iobit ransomware DeroHe vulnerability brand abuse

IOBit group forum hacked to spread ransomware to members

New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection.  According to the report, the attack was orchestrated to the group forum of IOBit...
Continue Reading
1 2 3 6