Data Corruption, A Potential New Trend in Ransomware AttacksExmatter, a well-known data exfiltration malware used by the BlackMatter ransomware group, has been spotted operating a new...
Month: September 2022
Adware Found in 75 Apps on Google Play and App Store
Adware Found in 75 Apps on Google Play and App StoreIn a recent investigation, security researchers have discovered 75 applications on Google Play and other ten...
Erbium, A New InfoStealer Malware on the Market
Erbium, A New InfoStealer Malware on the MarketErbium is a new Malware-as-a-Service (MaaS) designed to steal login credentials and cryptocurrency wallets. The Malware circulates at the...
Lorenz Ransomware Detection: The Group Leverages CVE-2022-29499 Vulnerability in Mitel VoIP Devices
Lorenz Ransomware Detection: The Group Leverages CVE-2022-29499 Vulnerability in Mitel VoIP Devices The Lorenz security threat group has been targeting corporate networks across the U.S., China,...
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flaws
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flawsWhile issuing an emergency patch for Endpoint Configuration Manager Data-stealing spyware disguised as...
Fake sites fool Zoom users into downloading deadly code
Fake sites fool Zoom users into downloading deadly codeAh, the human touch Beware the Zoom site you don't recognize, as a criminal gang is creating multiple...
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010
What Is Data Exfiltration? MITRE ATT&CK® Exfiltration Tactic | TA0010 The process of stealing data from a corporate system is also known as exfiltration. MITRE ATT&CK®...
Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover
Uber Breach 2022: Detect the Destructive Cyber-Attack Causing the Complete Organization’s System Takeover On September 15, Uber officially confirmed an attack resulting in an organization-wide cybersecurity...
Privacy watchdog steps up fight against Europol’s hoarding of personal data
Privacy watchdog steps up fight against Europol's hoarding of personal dataIf you could stop storing records on people unconnected to any crimes, that would be great...
TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back
TeamTNT Hijacking Servers: Criminal Gang Specializing in Attacking Cloud Environments is Back Honeypot activity spotted by one of the cybersecurity vendors confirmed that the cryptojacking TeamTNT...
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control
Shikitega Malware Detection: Executes Multistage Infection Chain, Grants Full Control A new stealthy Linux malware named Shikitega is on the prowl for its victims. Its operators...
Cambodian authorities crack down on cyber slavery amid international pressure
Cambodian authorities crack down on cyber slavery amid international pressureLured by fake jobs, victims are isolated abroad and forced to carry out crypto and romance scams,...
Mandiant identifies 3 hacktivist groups working in support of Russia
Mandiant identifies 3 hacktivist groups working in support of RussiaResearchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked...
Iran blocks Whatsapp, Instagram as citizens protest death of Mahsa Amini
Iran blocks Whatsapp, Instagram as citizens protest death of Mahsa AminiAlso: New 'magnet of threats' attackers and FBI has details on Iran's online incursion into Albania...
What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001
What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001 What Is Initial Access? MITRE ATT&CK® Initial Access Tactic | TA0001 Some MITRE ATT&CK tactics...
Erbium info-stealing malware, a new option in the threat landscape
Erbium info-stealing malware, a new option in the threat landscapeThe recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games....
Heimdal™ Featured in High Performer Quadrant Across Several Categories in G2 Fall Reports 2022
Heimdal™ Featured in High Performer Quadrant Across Several Categories in G2 Fall Reports 2022COPENHAGEN, September 27th, 2022 – After breaking being included in G2’s Summer Reports...
Top Challenges for MSSPs and MDRs and How to Overcome Them
Top Challenges for MSSPs and MDRs and How to Overcome Them Some things never grow old. In the world of security providers, there will always be...
Significant customer data exposed in attack on Australian telco
Significant customer data exposed in attack on Australian telcoSubscribers have questions – like 'When were you going to tell us?' Updated Australian telecommunications company Optus has...
CVE-2022-35405 Detection: CISA Warns of Adversaries Leveraging ManageEngine RCE Flaw
CVE-2022-35405 Detection: CISA Warns of Adversaries Leveraging ManageEngine RCE Flaw Shields up! On September 22, 2022, The Cybersecurity and Infrastructure Security Agency (CISA) released a directive...
Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?
Can Cloud Telephony Services with Military Grade Security Enable Organizations to Create High Brand Value?By Shubham Patidar, Research Consultant at Fact.MR In today’s technology driven world,...
Beware Revolut frozen card scams sent via SMS text
Beware Revolut frozen card scams sent via SMS textUsers of Revolut, the popular banking app, would be wise to be on their guard - as scammers...
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flaws
Check out this Android spyware, says Microsoft, the home of a gazillion Windows flawsWhile issuing an emergency patch for Endpoint Configuration Manager Data-stealing spyware disguised as...
Australia Thinking About Tougher Cybersecurity Laws
Australia Thinking About Tougher Cybersecurity LawsThe Australian government says that it’s considering adopting tougher cybersecurity laws for companies in the telecommunication sector following the recent Optus...
NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once
NullMixer Malware Detection: Hackers Spread a Dropper Using SEO to Deploy Multiple Trojans at Once Cybersecurity researchers have recently revealed a new wave of adversary campaigns...
Open up, it’s the IRS. We’re here about the crypto tax you dodged
Open up, it's the IRS. We're here about the crypto tax you dodged'At least ten' people didn't declare coin income. Wow, what a bust The IRS...
Crack The Code
Crack The CodeCybersecurity Workforce Certificate Program By Stephen Patrick, Marketing Coordinator at the University of Louisville According to the Identity […] The post Crack The Code...
Noberus ransomware gets info-stealing upgrades, targets Veeam backup software
Noberus ransomware gets info-stealing upgrades, targets Veeam backup software'One of the most dangerous and active malware developers operating at the moment' Crooks spreading the Noberus ransomware...
Privacy watchdog steps up fight against Europol’s hoarding of personal data
Privacy watchdog steps up fight against Europol's hoarding of personal dataIf you could stop storing records on people unconnected to any crimes, that would be great...
TAP Air Portugal confirms hack, as Ragnar Locker gang leaks data – including that of Portugese president
TAP Air Portugal confirms hack, as Ragnar Locker gang leaks data – including that of Portugese presidentPoliticians including Portugese president Marcelo Rebelo de Sousa are amongst...