Category

Third Party Risk Assessment

Third Party Risk Assessment page 1

mobile apps location tracking personal privacy compromised data

Mobile apps location tracking is invading personal data privacy

The hot debatable issue in the cyber world today is about the location tracking on mobile apps discussing the pros and cons of people’s privacy. In the recent news site that is prominent in India, it is said that aggregators have been sued together with telecom providers that sold collected data to third-party companies gathered...
Continue Reading
clubhouse social media app chinese government compromised data agora inc

Clubhouse social media app might be leaking data to Chinese Government

Launched amidst the pandemic in March 2020 with only 1500 users and a net worth of USD 100 million, the Clubhouse app soared up the digital market with a current count of estimated 10 million users and worth USD 1 billion in just 11 months aside from other found funding. The app became famous as...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
financial services finance industry sector covid19 cyberattacks fraud prevention

Financial Services suffer cyber-attacks related to Covid19

Cybercrime has significantly increased every year, which is directly proportional to the growth of technology. Factors attributed to this increase could be summed up due to the perpetrators’ persistent behaviour through new tactics like using Covid19 as theme and sophisticated applications. Cybercriminals are being backed up by governments and the victim’s open vulnerability. Different sectors...
Continue Reading
cryptojacking MrbMiner botnet Iran Vihansoft trojan Iran

MrbMiner botnet traced back to Iranian software company

With the growing followers of cryptocurrency, adversaries use different tactics to perform illegal mining activities to profit via cryptojacking. With the performance requirements needed by a database, riding to it is a great advantage that the ingenious MrbMiners has exploited. By targeting many Microsoft SQL servers via brute-force attacks, MrbMiner placed their group in the...
Continue Reading
iobit ransomware DeroHe vulnerability brand abuse

IOBit group forum hacked to spread ransomware to members

New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection.  According to the report, the attack was orchestrated to the group forum of IOBit...
Continue Reading
ministry of defence personal data loss incidents human error

Ministry of Defense in the UK experienced 18% increase in personal data loss incidents

The Ministry of Defense in the UK have an increase of 18% rise on personal data loss incidents for the combined fiscal year 2019 and 2020 based on the official figures after the analysis conducted by Parliament Street. The Defense Department of UK disclosed that there were 546 incidents of reported personal data loss last...
Continue Reading
whatsapp terms of service third party risk assessment privacy policy update

Whatsapp sharing to Third Party: Terms of Service and privacy policy update

Whatsapp the messenger and call app that was merged with Facebook through the acquisition of Facebook wants to mandate its users to accept the updated terms of service and privacy policies until February 8, 2021. In case you don’t want to accept the new terms, a user may opt to delete their accounts. The important...
Continue Reading
Voyager Cryptocurrency Broker DNS Threat Intelligence cyberattack

Voyager Cryptocurrency Broker Attacked?

Today’s trading landscape is advanced in the digital world, from trading securities to digital trading currencies that have no backing of value than the real world currencies backed by fiat and banking systems. We can easily conclude that cryptocurrencies are backed by hype too, where we see a rise and fall of digital currencies in...
Continue Reading
Cyberpunk 2077 crack installer mobile ransomware malware CoderWare BlackKingdom

Ransomware masquerades as the mobile version of Cyberpunk 2077

CoderWare is a recent ransomware in the block that has been victimizing the gamer populace under the guise of a trending game called Cyberpunk 2077 through the Windows and Android platform. Distributing them as game installers, cheats, and cracks are the social tricks used to get users installing the malware. Here is one screenshot where...
Continue Reading
1 2 3 5