Month: August 2022

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer

Dutch authorities on Friday announced the arrest of a software developer in Amsterdam who is alleged to be working for Tornado Cash, days after the U.S. sanctioned the decentralized crypto mixing service. The 29-year-old individual is “suspected of involvement in...

/ August 14, 2022
Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

Chinese Hackers Backdoored MiMi Chat App to Target Windows, Linux, macOS Users

A pair of reports from cybersecurity firms SEKOIA and Trend Micro sheds light on a new campaign undertaken by a Chinese threat actor named Lucky Mouse that involves leveraging a trojanized version of a cross-platform messaging app to backdoor systems....

/ August 13, 2022
Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

Conti Ransomware Operators Using ‘BazarCall’ Style Attack as an Initial Vector

In the context of phishing attacks, a BazarCall style attack is a form of targeted phishing that uses a call-back methodology in order to trick the user.  For the first time, this emerged to be marketed in 2020/2021 as a...

/ August 13, 2022
Top 10 Best Penetration Testing Companies – 2022

Top 10 Best Penetration Testing Companies – 2022

Penetration Testing Companies are pillars when it comes to information security, nothing is more important than ensuring your systems and data are safe from unauthorized access, Many organizations have a flawed security culture, with employees motivated to protect their own...

/ August 13, 2022
Synack at Black Hat: Leading You Through the Security Jungle

Synack at Black Hat: Leading You Through the Security Jungle

The Black Hat cybersecurity conference celebrated its 25th birthday in Las Vegas this week – and Synack was there to mark the occasion in style. We staged a safari adventure in the Black Hat Business Hall, replete with hanging vines,...

/ August 12, 2022
Researchers Found Series of Vulnerabilities in the Software Underlying Microsoft Teams & Other Apps

Researchers Found Series of Vulnerabilities in the Software Underlying Microsoft Teams & Other Apps

Security researchers discovered a series of vulnerabilities in the software underlying popular apps like Discord, Microsoft Teams, Spotify, and many others. Reports say the group of researchers presented their findings at the Black Hat cybersecurity conference in Las Vegas, explaining...

/ August 12, 2022
Ways That VoIP Technology Is Impacting Marketplaces and How to Adapt

Ways That VoIP Technology Is Impacting Marketplaces and How to Adapt

VoIP stands for Voice Over Internet Protocol. It allows users to communicate wirelessly and with high-quality sound. This has allowed many people to connect and enjoy the benefits of efficient communication directly. Technologies are influencing business retailers and how people approach...

/ August 12, 2022
Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments

Xiaomi Phones with MediaTek Chips Found Vulnerable to Forged Payments

Security flaws have been identified in Xiaomi Redmi Note 9T and Redmi Note 11 models, which could be exploited to disable the mobile payment mechanism and even forge transactions via a rogue Android app installed on the devices. Check Point...

/ August 12, 2022
Crucial Cybersecurity Software Features (2022)

Crucial Cybersecurity Software Features (2022)

Cyberattacks aim to breach device, program, and system defenses to access critical company or individual data. If a hacker attack is successful, unauthorized parties can modify, corrupt, destroy, or hold the data hostage until the victim pays a ransom. Data...

/ August 12, 2022
Yanluowang Ransomware Gang Claims To Have Stolen 2.8 GB Of Data From Cisco

Yanluowang Ransomware Gang Claims To Have Stolen 2.8 GB Of Data From Cisco

Posted on August 11, 2022 at 8:09 PM Cisco has confirmed that the Yanluowang ransomware group recently attacked its network to steal data. According to the networking giant, the gang compromised its corporate network in late May and tried to...

/ August 11, 2022
Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data

Cisco Was Hacked by Yanluowang Ransomware Operators to Stole Internal Data

Recent reports indicate that in late May Cisco’s corporate network was infected with ransomware from the Yanluowang group.  Under the threat of leaking stolen files to the online world, the threat actor attempted to intimidate the victims into making a...

/ August 11, 2022
Hackers Behind Cuba Ransomware Attacks Using New RAT Malware

Hackers Behind Cuba Ransomware Attacks Using New RAT Malware

Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques and procedures (TTPs), including a new remote access trojan called ROMCOM RAT on compromised systems. The new findings come from Palo Alto Networks’ Unit 42...

/ August 11, 2022