PE Tree – Free Open Source Tool Announced by BlackBerry to Fight Cybersecurity Attacks
PE Tree, initially developed for internal use is now made available for all security professionals. Blackberry’s announced at BlackHat USA 2020 that its open-source internal tool PE Tree is now available for all security professionals to use for reverse engineering malware. In their press...
Phishing attack – Data Breach at University of Utah Health
According to the U.S. Department of Health and Human Services, protected health information (PHI) of patients’ was affected by a data breach at the University of Utah Health. This is the third phishing attack on University of Utah this year. Previous attacks were reported in March and April....
337 Mobile Apps Targeted by New BlackRock Android Banking Malware
BlackRock Android Malware has a wide range of data theft capabilities, the targeted apps include banking, dating, social media, and instant messaging apps. Discovered by security firm ThreatFabric in May this year, this malware is based on the leaked source code of another malware strain Xerxes. It ...
US news sites hacked in WastedLocker ransomware attacks
Researchers with Symantec’s Threat Intelligence team who discovered these attacks confirmed – “dozens of U.S. newspaper websites owned by the same parent company have been compromised by SocGholish injected code”. Using fake software update alerts displayed by the malicious ...
IndiaMART data breached
IndiaMART, India’s largest online B2B marketplace for business products and services with 10 million downloads suffered a breach. Sensitive data of more than 40,000 suppliers is believed to be leaked and sold on online forums. Information leaked include suppliers’ user IDs, full names,...
Office 365 Targeted through Phishing Campaign
Using a sophisticated new phishing campaign, attackers used trusted, recognized brand names to bypass security filters and trick victims into giving up their Microsoft Office 365 credentials to bypass security protections and gain access to corporate networks. Check Point discovered that the campa...
Foodora Data Breach
Foodora, a brand of online food delivery service Delivery Hero has suffered a data breach. Exposing the user account details of 727,000 customers in the following 14 countries: United Arab Emirates, Singapore, Germany, Spain, France, Liechtenstein, Italy, Austria, Hong Kong,...
Microsoft Fixes 129 CVEs in its June 2020 Patch
In its biggest patch Tuesday security update ever, Microsoft released its June 2020 Patch update to fix a total of 129 newly discovered CVEs (Common Vulnerabilities and Exposures). Despite its biggest patch release, none of the vulnerabilities have been exploited in the wild before Microsoft release...
Maze Ransomware Targets VT San Antonio Aerospace
US aerospace services provider VT San Antonio Aerospace was targeted by the Maze Ransomware gang in March 2020. 1.5 TB of unencrypted files and sensitive data was reportedly stolen and now available on public domain in a massive data breach which was discovered on Jun 5. The stolen data incl...
Massive campaign against WordPress websites
In a massive attack on WordPress sites hackers tried to download configuration files by attacking old vulnerabilities in unpatched plugins to steal database credentials. To take over databases, old exploits were used to download or export wp-config.php files from unpatched websites, extract database...
RagnarLocker Group hide their presence by running Virtual Machines
A new technique where ransomware is run from within a virtual machine rather than on a computer is used by the operators of the RagnarLocker ransomware. They are installing VirtualBox- a type of software that lets you run virtual machines to avoid detection and hide from antivirus software. The Ragn...
Retail Organizations Targeted with Phishing and Typosquatting Campaign
Due to COVID-19 pandemic, there has been a steep rise in all kinds of online shopping and services. This rise has given an opportunity to hackers to target retail organisatios with phishing and typosquatting campaign attacks. As the research shows, with the better collection capabilities and an incr...
Thunderspy Attack – Leaves millions of Laptops and PCs Vulnerable
A new flaw called Thunderspy was found by Security researcher Björn Ruytenberg in the security protocols of Intel’s Thunderbolt ports. This can allow the hacker to bypass the login screen and its hard disk encryption to gain full access of Windows or Linux-based computers. The Thunderbolt port ...
Mandrake Android spyware infecting Android devices
Malware known as Mandrake, was detected earlier this year. It has been around since 2016 infecting tens of thousands of users. According to a report by Bitdefender- A newly uncovered strain of Android spyware lurked on the Google Play Store disguised as cryptocurrency wallet Coinbase among other thi...
Security Bugs in WordPress Plugins pose a threat to over million websites
Hackers are exploiting security vulnerabilities in WordPress plugins. This is an active exploitation of the security bugs, which aims to remotely execute arbitrary code. Any registered user can create WordPress websites from scratch and upload arbitrary files, install a backdoor to maintain access, ...
Unacademy hacked! Database of millions of users put up for sale on Dark web
Popular online educational platform Unacademy, with a user base of 14,000 teachers, a million video lessons, and 20 million registered learners is hacked. Database including usernames, emails addresses, passwords, date joined, last login date, first and last names, account profile and account statu...
Open-source blogging platform Ghost hacked!
Open source blogging platform Ghost was hacked hours after LineageOS servers got breached with the same vulnerabilities. Hackers exploited vulnerabilities CVE-2020-11651 an authentication bypass and CVE-2020-11652 a directory traversal to take control and to gain remote code execution capabilitie...
Three popular WordPress plugins LearnPress, LearnDash, and LifterLMS hijacked – Critical vulnerabilities found
Amidst Covid-19 pandemic various organizations and universities are using learning management systems (LMS) to manage online courses, host student resources, issue and mark assignments, online registration, assessments, collaborative technologies, payment processing, and facilita...
Viewing a GIF in Microsoft Teams allows hackers to Takeover Accounts
The vulnerability, impacting both desktop and web versions allowed the attacker to access all the data- confidential information, business plans etc. from organization’s Teams accounts by sending a malicious link to an innocent-looking image. Omer Tsarfati from cyberArk’s said, “Even if ...
BEC attack: Florentine Banker steals $1.3 Million from 3 British Private Equity Firms
A sophisticated hacker group named The Florentine Banker managed to trick three British private equity firms and steals $1.3 Million following a complex business email compromise (BEC) attack.As per cybersecurity firm Check Point, nearly $700,000 of the total wire transferred amount is permanentl...
Google Issues critical Warning for Chrome Users
Google has issued a security warning of a critical new vulnerability for Chrome users. They issued a Chrome update that includes a security fix. The new version of the browser 81.0.4044.113 is issued for Windows, Mac and Linux Google only revealed the codename for the exploit CVE-2020-6457 and a vag...
New tool released by Dell: SafeBIOS Events & Indicators of Attack (IoA).
Due to covid-19, many people are forced to work from home, but the network security at home may not be as secure as a corporate network. This is a security risk, that makes terminals vulnerable to malicious actors for stealing data.To enhance terminal security, Dell launched a new security tool call...
Critical update: Webex users phished
An ongoing phishing campaign is targeting remote workers who, due to ongoing covid -19 are relying on conferencing tools like Webex. Hackers are targeting victims with mails claiming to be a Cisco critical security advisory and asking them to update, to steal their Webex credentials. The malicio...
DarkHotel hackers breach Chinese government agencies using VPN zero-day vulnerabilities
DarkHotel hackers, a group believed to be from Korean peninsula, have launched a massive hacking operation at Chinese government agencies and their employees. Attacks believed to be related to the current COVID-19 outbreak, began last month, in March. The invasions were detected by Chinese securit...
Bugs discovered in WordPress plugin, letting hackers gain administrator privileges
A critical vulnerability has been discovered in WordPress Rank Math SEO plugin. With over 200,000 installations, Rank Math helps website owners to attract more traffic to their sites through search engine optimization (SEO). Rank Math is easy to setup, the setup wi...
Hackers exploiting Zoom, Google Hangouts to Spread Malware
Amid covid-19, need to work from home has become a necessity giving rise to popularity of platforms such as Zoom. A per report published by Check Point over 1,700 new “Zoom” domains have been registered since the onset of the pandemic in January, with 25 percent of the domains registe...
Maintain Distance from SpamEmails, Phishing Sites & Alerts
Maintain Distance from SpamEmails, Phishing Sites & Alerts#covid19#covid2020#coronavirus#coronacyberattack#coronacovid More than 2000 Domain Names related to CORONA have been Registered. Beware from Spam Emails, Phishing Sites, Fake Whatsapp Forwards & Cyber Criminals....
China-linked APT HACKERS EXPLOIT CISCO, CITRIX, ZOHO
APT 41, China-linked hackers groups launched a massive cyberattack on countries including Australia, Canada, Denmark, Finland, France, India, Italy, Japan, Malaysia, Mexico, Philippines, Poland, Qatar, Saudi Arabia, Singapore, Sweden, Switzerland, UAE, UK, and USA by exploits that trigger the vuln...
Third-Party App Store Downloads blocked by Google
Google expands its Advanced Protection Program (APP) to all Android users. Earlier the APP was offered to high risk individuals like politicians, business leaders, journalists. It is now available to users with an Android 7.0+ device to improve protection against malicious apps. Signing up for the ...
Cookie Thief – Android Malware stealing browser & Facebook app cookies
Two new Android malware launched to steal cookies from the browsers and Facebook app by gaining the root access on the victim’s Android device. This is an alarming concern as web services use cookies to store on the device a unique session ID that can identify the user without a password an...
Exploiting corona virus fear, hackers target companies
Threat actors are using phishing emails to target and install malware in company systems. Malicious emails mentioning corona virus that appear to be from institutions like CDC are sent in an attempt to get users to open the mail. According to cybersecurity firm Proofpoint Inc., which is monitorin...
T-Mobile Hacked –Employee Emails and Credentials Accessed
Telecom giant T-Mobile’s cybersecurity team discovered a sophisticated cyber-attack on the email accounts of some of its employees. This is a not the first data breach at T-Mobile, revealing personal data of employees and customers. It is not revealed how the attack happened. T- Mobile is in proc...
KrØØk vulnerability affects more than one billion Wi-Fi-enabled devices and access points
The critical security flaw could intercept and allow an attacker to decrypt wireless network packets transmitted by vulnerable devices using WPA2 connections. The Kr00k bug (CVE-2019-15126) affects common Wi-Fi chips Broadcom and Cypress which are built in access points (APs) and smartphones, ta...
Android malware Cerberus can steal Authenticator codes from Google
Cerberus online banking trojan can steal one-time passcodes (OTP) generated through Google Authenticator, by bypassing 2FA (two factor authentication) protected accounts. It’s a new Android banking trojan launched in June 2019 believed to be an elite class of malware with features similar to remo...
ObliqueRAT- A new malware targeting Government organizations
Phishing Email messages are sent to employ ObliqueRat malware targeting government organizations in Southeast Asia. According to experts at Cisco Talos, ObliqueRAT shares similar maldocs and macros with CrimsonRAT campaign from December 2019. The victims receive the threat on endpoint as a malicio...
Haken Clicker Malware affected thousands of Android apps on Google play
New malicious malware in play store apps infects android users. Known as Haken clicker, it takes control over the affected devices to steal user data, subscribe user to premium services and make illegitimate Revenue. There were eight malicious applications in Google Play Store which infected Android...
Iranian origin Malware Campaign Exploiting Vulnerable VPN Servers
Iranian origin malware Fox Kitten Targets Government, IT, Telecommunication, Oil and Gas, Aviation, and Security sectors around the world. This malware attacks networks by exploiting the vulnerabilities in VPN. Hackers secure the remote access to the internal system and networks of numerous companie...
Australian bushfire charity site targeted by cyber criminals
Entire world is familiar with Australian Bush fire, which has burned an estimate of 46 million acres. One billion animals were killed in this tragedy. People around the world are helping Australia to speed up relief process. And then, there are cyber criminals using this tragedy to exploit people wh...
Home and business PC’s exposed by a vulnerability in Dell Support assist
Millions of Dell Computers, both Business & home PCs exposed to vulnerability in Dell SupportAssist software. A preinstalled monitoring tool Dell SupportAssist, on Dell devices has reported a High severity vulnerability. which affects home and business PCs. It allows users to execute arbitrary c...
Bluetooth vulnerability on Android
A newly discovered Bluetooth vulnerability on Android lets attackers execute arbitrary code and silently take remote control of Device without user interaction. Security researchers discovered that Android 8 and 9 were affected by this vulnerability. Android 10 is not vulnerable but it leads to...
Automotive Cybersecurity
Sophisticated Vehicles today are connected with Bluetooth, Wi-Fi and many more apps making our lives easier, safer and more comfortable. Technology is rapidly advancing in the automotive space to meet user’s demand for convenience, also making vehicles susceptible to hackers, opening them to ...
IoT Cyber security
IoT (Internet of Things) is any networking of a device that connects to the Internet in order to exchange data. Electrical devices to home appliances are now connected and can be controlled remotely through internet, they offer convenience in our everyday lives and can also help boost productivity. ...
Restrict Third-party data sharing: FACEBOOK
Most people in the world have at least one Facebook account, making Facebook one of the biggest advertising platforms. Facebook has faced a lot of criticism over privacy and data breach controversies, as it collects users information by tracking their activities on internet. Online apps and websit...
Juice Jacking
A type of physical access attack on a Device or Data, Juice jacking also known as USB scam can be used to install malicious software through public charging stations. At times, using public charging stations is not avoidable, putting us at risk of getting hacked. A USB port can be used as power sock...
Jeff Bezos’ Phone hacked through WhatsApp
WhatsApp, with its end to end encryption security feature trusted by 1.5 billion users around the world, witnessed a high-profile hacking into Jeff Bezos’ phone, allegedly by the equally high-profile Saudi prince Mohammed bin Salman! While we are all vulnerable to...
Social Engineering
A clip from the new Netflix series Jamtara, doing rounds on social media shows how easily a retiree is getting conned out of his life savings through a simple phone call. This type of digital scam is known as social engineering. Social engineering is manipulating human psychology to maliciously gain...
Windows 10 Critical Security Flaw
The existence of a major vulnerability in Windows 10 was confirmed on Jan 14 2020 by the NSA. This is a critical bug that impacts millions of windows 10 users worldwide. Ann Newberg, director cybersecurity NSA, disclosed the vulnerability to Microsoft. Reporting of vulnerability is considered an unp...
2020 Cybersecurity Trends
Make a resolution in this new year to support the cyber defenses of your organization! There are plenty of questions from the cybersecurity point of view on what will be happening in 2020. What are the major trends in technology and what are the risks? Will the attackers want new technologies such a...
Over 267 million Facebook users data exposed online
More than 267 million Facebook users user IDs, phone numbers and names exposed online according to Comparitech and security researcher Bob Diachenko. The information found in the database was fully exposed without any password or other authentication methods, and the researchers believe it was...
10 CyberSecurity:”Resources” You Need to Know
10 CyberSecurity:”Resources” You Need to Know 1. National Institute of Standards and Technology (NIST) NIST, which is the old Department of Weights and Measures, is an agency of the US Government, a sub-department of the Chamber of Commerce. It is non-regulatory and it exists for th...
10 Most Important Cyber Security Tips
1. You Are A Target. Realize that you are an attractive target to hackers. Don’t ever say “It won’t happen to me.” 2. Eight Characters Is Not Enough. Practice good password management. Use a strong mix of characters, and don’t use the same password for multiple sites. Don’t share your pa...
Beware of Stalkerware
Research on commercial surveillance software We told readers that, despite working to protect against stalkerware programs for more than five years, it was time to take our efforts to the next level by spreading awareness of stalkerware and its dangers, and demonstrating how law enforcement, cyberse...
Hacker Steals Over 218 Million Zynga ‘Words with Friends’ Gamers Data
A Pakistani hacker who previously made headlines earlier this year for selling almost a billion user records stolen from nearly 45 popular online services has now claimed to have hacked the popular mobile social game company Zynga Inc. With a current market capitalization of over $5 billion, Zynga i...
New Critical Exim Flaw Exposes Email Servers to Remote Attacks
A critical security vulnerability has been discovered and fixed in the popular open-source Exim email server software, which could allow a remote attacker to simply crash or potentially execute malicious code on targeted servers. Exim maintainers today released an urgent security update—Exim versi...
Hackers abuses Google acquisition domains appspot.com and web.app in latest phishing attacks
These attacks make use of SSL certificates issued by Appspot.com and Web.app. The attackers have designed similar-looking login pages for the domains which are widely used in business. These fake login pages can be used to trick the victims and steal their Usernames and Passwords About domains Appsp...
Research latest: IT managers are struggling to cope with cyberattacks
New research from Sophos suggests that two thirds of organisations were hit by a cyberattack last year. The report lists the three biggest reasons why organisations are still struggling to reduce their risk: Attacks are coming in from multiple directions Cyberattacks are multi-stage, coordinated and...
Joker Malware Apps Once Again Bypass Google’s Security to Spread via Play Store
Billing fraud malware Joker evades Google Play security to infect Android devices. Hidden in legitimate applications, it has targeted Android users to subscribe them to premium services without their consent. It’s a tricky new variant of the Joker malware, identified by researchers with security ...