A high-severity malware has been found to Cisco’s enterprise-class Industrial Network Director that allows remote attackers to hijack this industrial network and allows attackers for arbitrary code execution as the root user. The Cisco Industrial Network Director (IND) is designed to help operations teams gain full visibility of network and automation devices in the context...Continue Reading
Critical malware used by hackers to hijack televisions are now attacking the popular IPTV middleware platform of more than a thousand of regional and international online media streaming services. This critical malware execution flaw, if exploited, will grant attackers the power to seize control of the streaming service and content on display and will extract...Continue Reading
A malware check has done by the security house of AiroAV when a newly-discovered malware interferes with internet traffic on infested Apple Macs and maliciously inserts Bing results into victim’s Google search results. This malware configures compromised macOS computers to modify Google search results through a local proxy server. This kind of malware is not...Continue Reading
After being silent for almost two years, cybersecurity researchers made malware check and found out that FIN8 Hacking Group has returned, devising a new method of hacking the hotel-entertainment industry using an updated version of a malware trojan known as ShellTea/PunchBuggy Backdoor.This attack was thought to be the first attack delivered by the FIN8 group...Continue Reading
Mobile phones in today’s generation are still selling like pancakes despite the stiff competition between different mobile phone manufacturers. Needless to say, mobile phones are still part of our daily lives which serves as a multi-functional tool from communication up to almost anything thanks to the applications made for mobile devices. It is well-known that...Continue Reading
On Thursday, analysts from Darktrace (.PDF) said that the present risk scene is loaded with everything from content kiddies and shrewd assaults to cutting edge, state-supported ambushes, and in the last sense, assaults keep on developing. Be that as it may, for each refined assault presently being used, there is the potential for further advancement...Continue Reading
A malware-bound Android application was discovered hanging around on Google Play for very nearly a year. Amid this time, the malignant application was accessible for download by all Google Play clients. The malware was covered up in an application named “Simple Call Recorder”, distributed by the FreshApps Group. At the season of disclosure, the pernicious...Continue Reading
Last December we discussed a written article about a hacker getting hacked by a banking Trojan. The banking malware was identified as the Lokibot which was exploited by being used by different cybercriminals. The details are in the previous article https://www.izoologic.com/2018/12/27/hacker-just-got-hacked/ Can you fathom how critical it is when a hacker itself gets hacked? Now...Continue Reading
Security researchers over the globe joined in a venture committed to sharing URLs used in malicious campaigns managed to take down close to 100,000 websites actively engaged in malware distribution. The task called URLhaus was started by abuse.ch, a non-benefit cybersecurity association in Switzerland. The operations began towards the end of March 2018 and recorded...Continue Reading
Iranian systems were as of late allegedly hit by another all the more ground-breaking variation of the notorious Stuxnet malware. The new Stuxnet variation is purportedly more forceful and modern. The malware was first found eight years prior when it focused on Iran’s atomic frameworks. The Stuxnet virus was uncovered some eight years ago,...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.