Browsing Category
Cybersecurity
125 posts
Social Engineering: Definition & 6 Attack Types
Social Engineering We all know about the attacker who leverages their technical expertise to infiltrate protected computer systems…
Dormant accounts are a low-hanging fruit for attackers
Proper MFA adoption Successful attacks on systems no longer require zero-day exploits, as attackers now focus on compromising…
Cybercriminals Target Telecom Provider Networks
Cybercriminals Target Telecom Provider The growing use of mobile devices for multifactor authentication increasingly has made telecom providers…
Facebook Termination Notices Leads to Phishing
Facebook Termination Phishing Business users receive a message from Facebook warning their accounts will be permanently suspended for…
UK Schools Hit by Mass Leak of Confidential Data
Schools Data Leak 2022 Confidential data from 14 UK schools has been leaked online by hackers following attacks…
Russian cyberattacks
Russian cyberattacks Since the beginning of the Russian invasion against Ukraine Poland has been a constant target of…
Why Use Password Manager in 2023
Why Use Password Manager in 2023 If you’re like most people, you probably have a lot of online…
Engage your employees with better cybersecurity training
employees better cybersecurity training Cybercriminals use a variety of tactics all at once and are constantly innovating. Organizations…
3 of the Worst Data Breaches in the World That Could Have Been Prevented
Worst Data Breaches Data breaches can be devastating for organizations and even entire countries. Eliminating the risk of…
Top 3 Non-Technical Cybersecurity Trends for 2023
Cybersecurity Trends for 2023 Cybersecurity isn’t just about technology. Non-technical aspects, such as the management of people, process,…
Fake Security App Found Abuses Japanese Payment System
Fake security app McAfee’s Mobile Research team recently analyzed new malware targeting mobile payment users in Japan. The malware which was distributed on the Google Play store pretends to be a legitimate mobile security app, but it is in fact a payment fraud malware stealing passwords and abusing reverse proxy targeting…
Attackers bypass Coinbase and MetaMask 2FA via TeamViewer, fake support chat
Attackers bypass Metamask 2FA A crypto-stealing phishing campaign is underway to bypass multi-factor authentication and gain access to…
Top passwords used in RDP brute-force attacks
Specops Software released a research analyzing the top passwords used in live attacks against Remote Desktop Protocol (RDP) ports. This…
Google will pay $391M to settle Android location tracking lawsuit
Google location tracking lawsuit Google has agreed to pay $391.5 million to settle a privacy lawsuit filed by…
Millions Lost in Minutes — Mitigating Public-Facing Attacks
Mitigating Public-Facing Attacks In recent years, many high-profile companies have suffered destructive cybersecurity breaches. These public-facing assaults cost…
Google Reveals Spyware Vendor’s Use of Samsung Phone Zero-Day Exploits
Google Spyware The flaws, tracked as CVE-2021-25337, CVE-2021-25369 and CVE-2021-25370, have been chained and exploited against Android phones,…
$28 million stolen from cryptocurrency platform Deribit
Stolen cryptocurrency platform Deribit Cryptocurrency derivatives platform Deribit on Tuesday said a hacker stole $28 million from the…
Malware on the Google Play store leads to harmful phishing sites
Malware on Google Play A family of malicious apps from developer Mobile apps Group are listed on Google Play and infected…
Cybersecurity is a matter of national security, experts tell Marcos
Cybersecurity is a National Security MANILA, Philippines — “Cybersecurity must be treated as a matter of national security,”…
New Phishing Campaign Targets Saudi Government Service Portal
Phishing campaign targets Saudi Government Multiple phishing domains impersonating Absher, the Saudi government service portal, have been set…
WordPress Security Update 6.0.3 Patches 16 Vulnerabilities
WordPress Security Update 6.0.3 WordPress 6.0.3 fixes nine stored and reflected cross-site scripting (XSS) vulnerabilities, as well as open…
Crypto trading platform Mango Markets drained of more than $100 million in flash loan attack
Mango Market Loan Attack Mango Markets — a cryptocurrency trading platform — was robbed of more than $100…
Columbia National Food and Drug Surveillance Institute hit with a cyberattack
Columbia Cyberattack Colombia’s National Food and Drug Surveillance Institute (INVIMA) said it is dealing with a cyberattack that…
Hacker returns nearly $19 million stolen on Transit Swap DeFi platform
Transit Swap Defi platform Transit Swap — a cryptocurrency platform that calls itself a “decentralized exchange” — said…
Phishing Campaigns Target KFC, McDonald’s in Saudi Arabia, UAE, Singapore
Phishing campaigns target McDonalds KFC and McDonald’s customers were targeted via phishing campaigns across Saudi Arabia, UAE and Singapore,…
Researchers Identify 3 Hacktivist Groups Supporting Russian Interests
Hacktivist Groups Supporting Russian At least three alleged hacktivist groups working in support of Russian interests are likely…
Google, Microsoft Can Get Your Passwords Via Web Browser’s Spellcheck
Google Microsoft Spell-jacking Extended spellcheck features in Google Chrome and Microsoft Edge web browsers transmit form data, including personally…
Hacker sells stolen Starbucks data of 219,000 Singapore customers
Hacker sells data of Singapore customers The Singapore division of Starbucks, the popular American coffeehouse chain, has admitted…
Researchers Warn of Self-Spreading Malware Targeting Gamers via YouTube
Malware targeting Gamers Gamers looking for cheats on YouTube are being targeted with links to rogue password-protected archive…
Ransomware gang threatens 1m-plus medical record leak
Ransomware medical record leak Two recent ransomware attacks against healthcare systems indicate cybercriminals continue to put medical clinics…