Category

Threat Intelligence

Threat Intelligence page 1

finfisher surveillance spyware germany malware

FinFisher tech firm raided by Authorities over Spyware claims

A Munich-based company, FinFisher, was raided by the German investigating authorities because of alleged illegal exporting of its software outside UE, including Turkey. FinFisher is the firm behind the commercial surveillance spyware dubbed as “FinSpy.” This software is a spying tool that was legitimately intended for Law enforcement investigation and intelligence agencies. Its well-known customers include...
Continue Reading
lokibot malware cisa advisory antimalware solutions

LokiBot Malware information stealer increase of hostility

Cybersecurity and Infrastructure Security Agency or CISA has recently issued a security advisory notice for US Federal Government organizations and private sectors about increasing LokiBot malware usage cases by threat actors that started in July 2020. EINSTEIN Intrusion Detection System, the in-house security platform CISA uses, has detected continuous malicious activities that can be traced...
Continue Reading
Operation SideCopy Report Espionage Indian Army indie apt actor

Operation SideCopy Report – Espionage against the Indian Army?

A recent analysis report from an Indian cybersecurity expert exposed an over a year of surveillance by an unknown adversary targeting the Indian government – specifically its military service and notable defense organization. They named the report as – Operation SideCopy. According to the report, the adversary had used a different methodology to pursue its...
Continue Reading
chowbus data breach brand abuse brand protection compromised data

Chowbus food delivery startup suffers massive data breach

Chowbus, an Asian food delivery startup owned by Fantuan Group, Inc., just suffered a massive data breach a couple of days ago. They have verified the intrusion and the amount of sensitive data that was compromised during the said breach. The initial assessment of the breach does not show the exact nature of the intrusion....
Continue Reading
mozi botnet iot internet-of-things traffic

Mozi Botnet responsible for IOT Traffic

The latest feast on the cybersecurity realm evolved on the recent report submitted to the community about the Mozi botnet infesting numerous internet-of-things (IoT) devices. After the discovery in 2019, cybersecurity experts observed that this variant of the Mirai botnet has been in circulation for 90% of botnet attacks from October 2019 to June 2020....
Continue Reading
Shenzhen Zhenhua Data Tech Data Leak compromised data china chinese company

Shenzhen Zhenhua Data Technology allegedly collected Data

Chinese data services company Shenzhen Zhenhua Data Technology is now being questioned with its database and its application called the Overseas Key Information Database or OKIDB. The company is owned by a government-backed military research company – China Electronics Technology Group (CETC). Wherein its CEO is a known supporter of hybrid and psychological warfare, which...
Continue Reading
us department of defense vulnerabilities software hardware dod white hat hackers vulnerability assessment

U.S. Department of Defense disclosure on vulnerabilities

A recent disclosure from the U.S. Department of Defense details has been announced to the public. This is about their infrastructure system’s critical and high severity vulnerabilities. The vulnerabilities can allow threat actors to exploit the systems by hijacking a subdomain, remote code execution, or view and capture data and files on a vulnerable machine...
Continue Reading
european union sanction cyber criminal cybercriminal crybercrime russia china north korea hacking group

European Union imposed first-ever sanction against hacker organizations

The first-ever sanction against Cybercriminals that are targeting European Citizens was imposed by the Council of the European Union. There were six individuals and three entities that were involved in various Cyber-attacks, such as WannaCry, NotPetya, and Operation Cloud Hopper. The six individuals involved include Chinese Citizens and Russian Nationals. Technology companies from Russia and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
cybercrimes cyber attack canada canadian population fraud prevention

Half Of the Canadian Population Were Preys of Cybercrimes

Recent statistics that were presented by the cybersecurity researchers of Canada, under one of its cybercrime body – Cybersecure Policy Exchange (CPX) shows that 57% has been victimized by different online fraud. This contrasts with other researchers that were reported in 2017, wherein they gauge that only 36% has become a victim of cybercrimes and...
Continue Reading
1 2 3 4