Category

Threat Advisory
Firefox Monitor
Firefox Monitor, a breach warning site propelled by Mozilla in September, would now be able to convey cautions from inside Firefox program.  When the service goes live in the coming weeks, Firefox users running version 62 and later will see a symbol show up in the location bar when they visit a known breach site....
Continue Reading
Chegg Data Breach – Password Resets for 40 Million Users
Chegg, an education technology company, reportedly suffered a massive data breach a few months ago. The incident, however, remained hidden as the company didn’t notice the hack previously. Nonetheless, recently, an Education Technology Consultant and Tech Blogger, Phil Hill, stumbled upon an 8-K form filed with the SEC (Securities and Exchange Commission) that made him...
Continue Reading
China Spy Chips
Tech Companies have ardently denied Bloomberg’s declaration that China’s Super Micro gave them hardware loaded with spy chips, but that isn’t stopping all sorts of accusations from pouring in. Bloomberg claims it has obtained documents from security researcher Yossi Appleboum that reportedly show evidence of an unnamed major US telecom finding “modified hardware” from Super...
Continue Reading
PGA Americas Held Ransom for Bitcoins - iZOOlogic
Cyber Attackers have taken over the control of computer servers belonging to the PGA of America, demanding a bitcoin ransom from the famed golf association in order to return control to them. Officials were locked out of critical files that relate to the PGA Championship and the upcoming Ryder Cup in France. While trying to...
Continue Reading
Cox Communications
Just earlier this month, a group of researchers uncovered a rather simple insecurity on the website for Cox Communications, a US cable and internet provider with around six million customers. The problem they uncovered would have given attackers an all-out access to user accounts and gain access to sensitive user information like billing and credit...
Continue Reading
NewsNow Hacked: User Passwords Exposed
NewsNow, the popular news aggregation site just suffered a huge data breach that may have resulted in exposing their users’ encrypted passwords. The news aggregator failed to mention anything about the breach on its site or on any of its social media accounts. It is reportedly notifying affected customers via email: —– “We are writing...
Continue Reading
IBM WebSphere is a software framework and middleware that hosts Java-based web applications. This means that it’s similar to Adobe’s Flash Player, in a way that it allows Java-based applications to run on a web browser. This also means that since it hosts Java-based content, any and all information on sessions involving such applications will be taken note of, until the next time that the Java application is accessed. This threat is performed through inserting Java-based code on an application being ran, and this code is enough to send copies of information that’s been input towards a different location. For example: you’re playing a Java-based game on your browser and made an in-game purchase. For these purchases to take effect, you will have to input your credit card information, as well as other personal information that they will keep on file. If the vulnerabilities on WebSphere have been exploited, a code has already been inserted towards the page wherein you input the said information, and sends copies of It to a location where the perpetrator has access to, hence, immediately putting your financial security at risk. This is a form of injected phishing that targets a specific platform, and millions have been victims of such an activity. The reported affected versions of WebSphere are as follows: IBM WebSphere Application Server 9.0 versions prior to 9.0.0.10, with an interim fix on version 9.0.0.9 that has since been attacked IBM WebSphere Application Server 8.5 versions prior to 8.5.5.15, with an interim fix on version 8.5.5.14 that has since been attacked IBM WebSphere Application Server 8.0 versions prior to 8.0.0.15 IBM WebSphere Application Server 7.0 versions prior to 7.0.0.45 The interim fixes have been attacked primarily due to government institutions making use of this platform. This issue is due to the unsafe handling of JAVA object de-serialization through the SOAP connector. An attacker can exploit this issue by sending a specially crafted object through the SOAP connector. Upon successful exploitation, the attacker can then have full privileges on the platform, which allows them to edit, create, delete and export data with no inhibitions. That’s a major threat. There are several preventive measures that we can apply to try and mitigate the damage this can cause: Upgrade to the latest version of IBM WebSphere Application Server Verify no unauthorised system modifications have occurred before applying any patches Apply the principle of Least Privilege to all systems and services Remind users not to visit websites or follow links that come from untrusted sources These are not absolute fixes, but these can help reduce the risk of being exposed to this vulnerability. Until IBM designs a vaccine for this threat, this would be our best course of action.
IBM WebSphere is a software framework and middle ware that hosts Java-based web applications. This means that it’s similar to Adobe’s Flash Player, in a way that it allows Java-based applications to run on a web browser. This also means that since it hosts Java-based content, any and all information on sessions involving such applications...
Continue Reading
Cobalt Threat Group Dishing Out SpicyOmelette
Cobalt Gang, also known as Gold Kingswood, is spreading SpicyOmelette malware – targeting banking and other financial institutions worldwide. Cyberattacks against banks and its clients alike are spreading and evolving in nature and complexity – it is often financial institutions which bear the burden. Banking customers being deceived by fraudulent schemes or those that become...
Continue Reading
Zero-day Exploit for Microsoft's Windows10 Revealed – No Patch Yet
A talented Microsoft bug seeker with an affinity for open divulgences by means of Twitter has straightforwardly drifted another Windows 10 zero-day imperfection. The analyst, who passes by the alias SandboxEscaper, says the bug is available in the code taking care of cutting edge advanced local procedure calls (ALPCs). It tends to be abused by...
Continue Reading
Fraudulent Bank Apps Possibly Acquired Thousands of Customer Data
Fraudulent applications of SBI (State Bank of India), ICICI India Ltd., Axis Bank, Citi and other large banks are accessible on Google Play, which may have stolen information of thousands of bank clients, asserts a report by an IT security firm. These phony android applications have the logo of individual banks which makes it troublesome...
Continue Reading
1 2 3 5

Categories