Month: May 2022

Latest Mobile Malware Report Suggests On-Device Fraud is on the Rise

An analysis of the mobile threat landscape in 2022 shows that Spain and Turkey are the most targeted countries for malware campaigns, even as a mix of new and existing banking trojans are increasingly targeting Android devices to conduct on-device...

/ May 31, 2022

Cybersecurity Automation: How Can Businesses Benefit From It

Businesses of all sizes are prone to cyberattacks, and this is no longer a taboo. Malicious actors are becoming intelligent, and tools are evolving, so what could prevent data breaches or other cybercrimes? The truth is that it can be...

/ May 31, 2022

A New York man was Sentenced for Purchasing Stolen Cards & Assisting the Infraud Organization

A New York man, John Telusma (aka ‘Peterelliot’), 37 years old was sentenced to four years for purchasing stolen or compromised credit cards and assisting other members of the Infraud Organization in monetizing their fraudulent activity. The Infraud Organization is...

/ May 31, 2022

Hackers demand $250,000 Ransom After Stealing Verizon Employee’s Database

Posted on May 31, 2022 at 2:36 PM Verizon has become the latest victim of a hacking attack, as the full names, phone numbers, corporate ID, and email addresses of some of the employees were exposed. Verizon has also confirmed...

/ May 31, 2022

The role of attack surface management to bolster data breach protection

TL/DR: The ways attackers steal information are probably as many as there are attackers. Attackers are creative and their methods differ depending on the tools, techniques, procedures available to them. Jonas Gille, Head of Information Security at Detectify, breaks down how...

/ May 31, 2022

Threat Actors Execute DDoS Attack, Claim To Be From REvil Group

Posted on May 31, 2022 at 2:44 AM The defunct REvil ransomware group has claimed to be responsible for recent distributed denial of service (DDoS) attacks against some network providers, including cloud networking platform Akamai. According to reports, the defunct...

/ May 31, 2022

Hackers Selling US Colleges VPN Credentials on Russian Forums- FBI

The network credentials and VPN access information were mainly acquired through ransomware, spear-phishing, and other cyberattacks. According to the US Federal Bureau of Investigation (FBI), hackers are selling virtual private network (VPN) access and network credentials used by employees of...

/ May 30, 2022

A New Linux-based Botnet Targeting Vulnerabilities in Web Servers & Android Servers

Currently, a new botnet extends its reach with the help of code originating from various pieces of malware. The company is doing so by rapidly adding exploits for several vulnerabilities recently identified in the following things:- Web servers Content management...

/ May 30, 2022

Is 3rd Party App Access the New Executable File?

It’s no secret that 3rd party apps can boost productivity, enable remote and hybrid work and are overall, essential in building and scaling a company’s work processes. An innocuous process much like clicking on an attachment was in the earlier...

/ May 30, 2022

How you could get hacked through a simple USB device

In this video you’ll learn how any USB device such as a normal lamp can be converted to be used to launch a badusb attack, exactly like a rubber ducky or any other HID attack device. This lamp can then...

/ May 30, 2022

The Most Secure Operating System – Qubes OS

This video will introduce you to Qubes OS – an operating system that is designed to protect you using compartmentalisation. It’ll explain how it works, give you a demo of the whole operating system and show you how you can...

/ May 30, 2022

Security Researchers Discover ChromeLoader Malware Targeting Chrome Users

Posted on May 29, 2022 at 7:12 PM Researchers have also warned those looking for cracked software or games. That is because malicious ISO archive files have increased their capabilities to infect systems with ChromeLoader. The ChromeLeader malware has been...

/ May 29, 2022