Month: May 2022

Latest Mobile Malware Report Suggests On-Device Fraud is on the Rise
An analysis of the mobile threat landscape in 2022 shows that Spain and Turkey are the most targeted countries for malware campaigns, even as a mix of new and existing banking trojans are increasingly targeting Android devices to conduct on-device...

Cybersecurity Automation: How Can Businesses Benefit From It
Businesses of all sizes are prone to cyberattacks, and this is no longer a taboo. Malicious actors are becoming intelligent, and tools are evolving, so what could prevent data breaches or other cybercrimes? The truth is that it can be...

A New York man was Sentenced for Purchasing Stolen Cards & Assisting the Infraud Organization
A New York man, John Telusma (aka ‘Peterelliot’), 37 years old was sentenced to four years for purchasing stolen or compromised credit cards and assisting other members of the Infraud Organization in monetizing their fraudulent activity. The Infraud Organization is...

Hackers demand $250,000 Ransom After Stealing Verizon Employeeâs Database
Posted on May 31, 2022 at 2:36 PM Verizon has become the latest victim of a hacking attack, as the full names, phone numbers, corporate ID, and email addresses of some of the employees were exposed. Verizon has also confirmed...

The role of attack surface management to bolster data breach protection
TL/DR: The ways attackers steal information are probably as many as there are attackers. Attackers are creative and their methods differ depending on the tools, techniques, procedures available to them. Jonas Gille, Head of Information Security at Detectify, breaks down how...

Threat Actors Execute DDoS Attack, Claim To Be From REvil Group
Posted on May 31, 2022 at 2:44 AM The defunct REvil ransomware group has claimed to be responsible for recent distributed denial of service (DDoS) attacks against some network providers, including cloud networking platform Akamai. According to reports, the defunct...

Hackers Selling US Colleges VPN Credentials on Russian Forums- FBI
The network credentials and VPN access information were mainly acquired through ransomware, spear-phishing, and other cyberattacks. According to the US Federal Bureau of Investigation (FBI), hackers are selling virtual private network (VPN) access and network credentials used by employees of...

A New Linux-based Botnet Targeting Vulnerabilities in Web Servers & Android Servers
Currently, a new botnet extends its reach with the help of code originating from various pieces of malware. The company is doing so by rapidly adding exploits for several vulnerabilities recently identified in the following things:- Web servers Content management...

Is 3rd Party App Access the New Executable File?
It’s no secret that 3rd party apps can boost productivity, enable remote and hybrid work and are overall, essential in building and scaling a company’s work processes. An innocuous process much like clicking on an attachment was in the earlier...

How you could get hacked through a simple USB device
In this video you’ll learn how any USB device such as a normal lamp can be converted to be used to launch a badusb attack, exactly like a rubber ducky or any other HID attack device. This lamp can then...

The Most Secure Operating System – Qubes OS
This video will introduce you to Qubes OS – an operating system that is designed to protect you using compartmentalisation. It’ll explain how it works, give you a demo of the whole operating system and show you how you can...

Security Researchers Discover ChromeLoader Malware Targeting Chrome Users
Posted on May 29, 2022 at 7:12 PM Researchers have also warned those looking for cracked software or games. That is because malicious ISO archive files have increased their capabilities to infect systems with ChromeLoader. The ChromeLeader malware has been...