Threat Advisory

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

Cyber Criminals have effectively pulled back 1.3 million of the stolen tokens. The Swiss cryptographic money trade is as yet exploring the reason for the rupture. Switzerland-based digital money trade Trade.io endured a break that brought about programmers taking around 50 million TIO (Trade.io tokens) from one of its wallets that was held in cool...
Continue Reading
Phishing : UK Tax Refund Scheme

Phishing: UK Tax Refund Scheme

Cybercriminals are getting an early start by promising U.K. computer users a sizable tax refund in an attempt to steal their personal data. Recipients of the email scam, which appeared to come from Her Majesty’s Revenue and Customs (HMRC) the U.K. government department responsible for collecting taxes, were told to visit a gateway portal to...
Continue Reading
Queensland Government Attacked By Cyber Criminals

Queensland Government Attacked By Cyber Criminals

A rather large group of international cyber attackers have just attacked the Queensland Government, with cyber researchers being forced to defend against several potentially catastrophic barrage of online attacks. Just early last year, the state government’s cyber security experts detected and stopped more than 20 distributed denial of service (DDoS) attacks, during which an average...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the...
Continue Reading
UK News Sites Fall Victim to Domain Spoofing

UK News Sites Fall Victim to Domain Spoofing

A new study from DNS-based cyber threat intelligence firm DomainTools has exposed how cyber attackers are now using domain-squatting to spread disinformation and fake news to the public as well. After analysing domains associated with leading UK media outlets – BBC News, The Guardian, Sky News, ITV News, and the Daily Mail – the firm...
Continue Reading

Drupalgeddon V2 Update: Backdoors by utilizing Shellbot Malware

The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrolment Program. Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection.   The Add-On was developed by a German firm named Creative Software Solutions, it has over...
Continue Reading
Phishing using the ZeroFont Technique

Cyber Attack: Phishing using the ZeroFont Technique

Cyber criminals area at it again. And this time, they are after familiar territory – Office 365. Ever since the developments in security for messaging systems, security experts have already given us due notice regarding the possible threats of bogus or fraudulent emails. This will be an ever-growing hazard since in this digital age, almost...
Continue Reading
1 2 3 4