A New Destructive Malware Targeting Ukrainian Government and Business Entities

Cybersecurity teams from Microsoft on Saturday disclosed they identified evidence of a new destructive malware operation targeting government, non-profit, and information technology entities in Ukraine amid brewing geopolitical tensions between the country and Russia. “The malware is disguised as ransomware...

/ January 16, 2022

Largest dark web market for stolen cards UniCC calls it quits

UniCC marketplace has been active on the dark web since 2013 however its team has called its quits due to “age” and “health” related issues. UniCC, Dark Web’s one of the biggest carding platforms, has announced to retire from the...

/ January 15, 2022

Massive Cyber Attack Knocks Down Ukrainian Government Websites

No fewer than 70 websites operated by the Ukrainian government went offline on Friday for hours in what appears to be a coordinated cyber attack amid heightened tensions with Russia. “As a result of a massive cyber attack, the websites...

/ January 15, 2022

Russia ”neutralizes” REvil ransomware gang, arrests 14

According to Russia’s top agency FSB (Federal Security Service), the arrests against the Revil ransomware gang were made at the request of the government of the United States. Russia’s Federal Security Service (FSB) has arrested and charged 14 suspects for...

/ January 15, 2022

The HackerOne Global Top 10—Hacker Expertise, Industry Data, and Up-to-Date Vulnerabilities

Many security teams use the OWASP Top 10 as a guideline to understand where they should focus their security strategies and cyberattack prevention efforts. The OWASP Top 10 originated in 2003 and has become a benchmark for compliance, education, and...

/ January 14, 2022

Android Users can Disable 2G to Protect From Stingrays or IMSI Catchers

The EEF (Electronic Frontier Foundation) has recently claimed that a new feature has been added to Android quietly by Google. But, you might be wondering what new feature? Google added a new option to its Android OS that enables the...

/ January 14, 2022

Cisco Releases Patch for Critical Bug Affecting Unified CCMP and Unified CCDM

Cisco Systems has rolled out security updates for a critical security vulnerability affecting Unified Contact Center Management Portal (Unified CCMP) and Unified Contact Center Domain Manager (Unified CCDM) that could be exploited by a remote attacker to take control of...

/ January 14, 2022

Beware!! Magniber Ransomware Delivered via Microsoft Edge and Google Chrome as an Update

In an ongoing campaign, the threat actors are distributing Magniber ransomware as an update through modern web browsers. Cybersecurity researchers at ASEC have closely monitored Magniber and reported that to deploy this ransomware the operators behind it are actively exploiting...

/ January 14, 2022

Hot wallet hack: Hackers steal $18.7m from Animoca’s Lympo NTF platform

The hackers gained access to NFT platform Lympo’s operational hot wallet on Monday and managed to steal 165.2 Million LMT (worth $18.7 million). NFT (aka non-fungible token) has become a major gamechanger on the blockchain but at the same time,...

/ January 13, 2022

Chinese Hackers Exploiting Log4Shell Vulnerability & Attack Internet-Facing Systems

The Chinese hackers are actively exploiting the Log4Shell Vulnerability in the Log4j library and it is identified as “CVE-2021-44228.” Microsoft experts have claimed that Chinese hackers are targeting the companies and individuals with a new ransomware strain for double extortion,...

/ January 13, 2022

The BlueNoroff cryptocurrency hunt is still on

BlueNoroff is the name of an APT group coined by Kaspersky researchers while investigating the notorious attack on Bangladesh’s Central Bank back in 2016. A mysterious group with links to Lazarus and an unusual financial motivation for an APT. The...

/ January 13, 2022

US Cyber Command Links ‘MuddyWater’ Hacking Group to Iranian Intelligence

The U.S. Cyber Command (USCYBERCOM) on Wednesday officially confirmed MuddyWater’s ties to the Iranian intelligence apparatus, while simultaneously detailing the various tools and tactics adopted by the espionage actor to burrow into victim networks. “MuddyWater has been seen using a...

/ January 13, 2022