Category

Threat Intelligence

Threat Intelligence Page 1

Top 14 Android mobile Apps Firebase misconfigured

Top 14 Android Apps with Millions of installs are Firebase misconfigured

The research revealed that nine out of fourteen android apps, which have more than 30 million users, are potentially leaking data. The top 14 Android apps with over a hundred million installs are at risk for being Firebase misconfigured. Unauthorized parties might access these apps and expose confidential data.     Almost everyone has an Android app installed on...
Continue Reading
Cloud storage applications malware downloads ransomware

Cloud storage applications top the most utilized avenue of malware downloads, according to recent studies

Cyberattacks have been utilizing cloud applications as an avenue of distributing malware, as per recent studies. Researchers have identified that 68% of malware downloads were derived from cloud applications for the 2nd quarter of 2021. Cloud-based misconfigurations are often a contributing factor in terms of these issues.    About 66.4% of malware downloads for the 2nd...
Continue Reading
Indonesia government agencies ministries cyberattack threat actors cyber espionage mustang panda

Indonesian agencies and ministries attacked through threat actors cyber-espionage attempts

Cyber-espionage threat actors from China were reported to have breached about 10 internal networks of Indonesian agencies and government ministries. The attack includes the computer devices of Badan Intelijen Negara (BIN) – the primary intelligence services of Indonesia.  Unexpectedly, the cyber-espionage attempt of threat actors from China was revealed in between a time when both...
Continue Reading
Cyber fifth warfare dimension UK armed forces

Cyber named as the fifth warfare dimension as per the UK armed forces

According to military leaders of the UK, their armed forces are preparing to commence significant advantages regarding their cybersecurity capabilities in the following years. Cyberspace being confirmed as the fifth warfare domain together with land, air, sea, and space forces the defence authorities to improve their operations all across the West.  The range of the...
Continue Reading
massive rise cybercrime attacks India reached 11% 2020

Data says that a massive rise of cybercrime attacks in India reached up to 11.8% in 2020

Official data has shown that for the year 2020, India has recorded over 50,053 cases of cybercrime, and 11.8% of it has been a surge of offences over the prior fiscal year.  Following the country’s measuring system incidents per lakh population, the cybercrime rate in India has also grown from 3.3% last 2019 to up to...
Continue Reading
Chinese APT campaign Operation Harvest McAffee

A Chinese APT campaign called ‘Operation Harvest’ was caught by McAffee

McAfee Enterprise, an American global computer security software company in California, has reported finding a threat actor group wherein they could dwell and collect data on a victim’s network for many years without being caught. The firm has identified the Chinese advanced persistent threat or APT campaign as “Operation Harvest”, where attackers use a mixture of both recognized and...
Continue Reading
Evidence suspicious emails phishing attack threats vishing SMiShing

Evidence proves that one out of three flagged suspicious emails were actual phishing attack threats

Recent reports reveal that about a third of emails that employees have been reporting to be malicious are indeed threats of phishing attacks. From the analysis of IT security companies, it was found that at least 33% of more than 200,000 flagged emails by employees from different firms worldwide for the first half of 2021...
Continue Reading
source code leak Babuk ransomware dark web monitoring

Complete source code of Babuk ransomware has been leaked on a Russian-speaking forum for hackers

Ransomware called Babuk Locker’s complete sources has recently been leaked by a threat actor. The incident has happened inside a Russian-speaking forum for hacking-related subjects. Launched around early 2021, Babuk Locker, also known as Babyk, has begun to victimise many businesses in double-extortion attacks to execute data theft and data encryption. The ransomware group behind...
Continue Reading
Admin credentials targeted cybercriminals cloud server cyberattacks

Admin credentials are targeted by cybercriminals to improve attacks against cloud servers

According to Lacework analysts, Docker, Redis, SQL, and SSH have been the main targeted cloud servers in the last three months.  As reported by Lacework’s 2021 Cloud Threat Report Volume 2, a lot of firms must now count cyber threat actors as their competitors. This is due to these two main reasons: cybercriminals are extending...
Continue Reading
5G Network rollouts government firms more robust security Singapore

As 5G Network rollouts gather over a hundred thousand new clients, the government urges firms to execute more robust security

As for Singtel, a Singaporean telecommunications corporation that reached over 180,000 new 5G network subscribers and expanded with new commercial use cases which operate on the 5G standalone network, their government has advised stronger security and resiliency in ensuring the safety of the 5G networks.  The 5G networks are mostly software-driven systems that are essentially...
Continue Reading
1 2 3 6