Threat Advisory

The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banking Trojan Now Targeting the US, Japan & Canada

The Panda Banker is a banking Trojan that seems to be related to the Zeus Trojan. The Panda Banker, a recently uncovered banking Trojan, is related to one of the most famous and destructive banking Trojans in history. Zeus is quite an old threat that has spawned countless imitators. The Panda Banker is used to...
Continue Reading
LoJax: The First Ever UEFI Rootkit Released

LoJax: The First Ever UEFI Rootkit Released

Researchers from ESET who discovered the rootkit say this is the first time researchers successfully detected an actively exposed rootkit that exploits the UEFI or Unified Extensible Firmware Interface specification that defines a software interface between an operating system and platform firmware. By injecting itself this deeply into the computer, the attackers hope to achieve...
Continue Reading
US$7.5M Worth of CryptoCurrencies stolen from Trade.io

US$7.5M Worth of CryptoCurrencies stolen from Trade.io

Cyber Criminals have effectively pulled back 1.3 million of the stolen tokens. The Swiss cryptographic money trade is as yet exploring the reason for the rupture. Switzerland-based digital money trade Trade.io endured a break that brought about programmers taking around 50 million TIO (Trade.io tokens) from one of its wallets that was held in cool...
Continue Reading
Phishing : UK Tax Refund Scheme

Phishing: UK Tax Refund Scheme

Cybercriminals are getting an early start by promising U.K. computer users a sizable tax refund in an attempt to steal their personal data. Recipients of the email scam, which appeared to come from Her Majesty’s Revenue and Customs (HMRC) the U.K. government department responsible for collecting taxes, were told to visit a gateway portal to...
Continue Reading
Queensland Government Attacked By Cyber Criminals

Queensland Government Attacked By Cyber Criminals

A rather large group of international cyber attackers have just attacked the Queensland Government, with cyber researchers being forced to defend against several potentially catastrophic barrage of online attacks. Just early last year, the state government’s cyber security experts detected and stopped more than 20 distributed denial of service (DDoS) attacks, during which an average...
Continue Reading
WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

WhatsApp Accounts Can Be Compromised: Via Video Call or Messaging

Popular Social Media application – WhatsApp – and its users are being warned of a newly discovered attack that allows hackers to infiltrate your private messages and group chats. Combined with other hacking and infiltration methods, the flaw could allow cyber criminals to impersonate you and even spread fake messages to your friends on the...
Continue Reading
UK News Sites Fall Victim to Domain Spoofing

UK News Sites Fall Victim to Domain Spoofing

A new study from DNS-based cyber threat intelligence firm DomainTools has exposed how cyber attackers are now using domain-squatting to spread disinformation and fake news to the public as well. After analysing domains associated with leading UK media outlets – BBC News, The Guardian, Sky News, ITV News, and the Daily Mail – the firm...
Continue Reading

Drupalgeddon V2 Update: Backdoors by utilizing Shellbot Malware

The same vulnerability of Drupal has been recently discovered to be causing security issues again, but this time aided by Shellbot, or Perlbot. The recent incidents and upcoming waves of attacks are targeting unpatched Drupal websites that are susceptible to Drupalgeddon 2.0. The threat actors are employing a special method which uses PowerBot malware, a...
Continue Reading
Apple’s Work and School Products Leaking Info

Apple’s Device Enrolment Program Leaking Info

Apple products – like iPhones, MacBooks and iPads, are most often registered and verified using their unique device serial numbers through Apple’s Device Enrolment Program. Organizations use the program to manage devices they hand out. It’s how teachers monitor school-issued iPads and iPhones and how the New York Police Department rolls out its custom apps...
Continue Reading
1 2 3 4 5