Cybercriminals are using banking trojans extensively. We discuss Android malware that has evolved to be more harmful and sneakier. Cleafy, a security firm, studied…
General
Hackers using a new method to plant AsyncRAT malware
A malware campaign, since September 2021, has been using an advanced phishing attack to deliver the AsyncRAT trojan. “Through a simple email phishing tactic…
Log4j vulnerability targets SolarWinds, ZyXEL devices
SolarWinds and ZyXEL devices are being attacked by cybercriminals who are searching for Log4jShell vulnerability aka log4j vulnerability. The devices are known to contain…
Rootkit iLO attacking HP Servers – CyberDaily
An unknown rootkit has been targeting Hewlett-Packard Enterprise’s Integrated Lights-Out (iLO) server management technology. The hackers have used the iLO to rig the firmware…
Web application attacks substantial rise
Imperva Research Lab’s study concluded that web application attacks are rising, on average, by 22% each quarter. The study examined nearly 4.7 million web…
Data Breach in West Virginia Hospital
Hackers targeted a hospital system in West Virginia; the attackers used a phishing attack for a data breach from the hospital’s system. Monongalia health…
Facebook extends its bug bounty program
Meta Platforms, formerly known as Facebook, has announced that it’s scaling up its bug bounty program. The bug bounty program will start rewarding genuine…
CS energy prevents Ransomware attack
A ransomware attack on CS energy network was warded off. If the ransomware attack had been successful, the attack would have deprived millions of…
BitMart loses $200 million worth of cryptocurrencies
BitMart, a cryptocurrency trading platform, revealed a “large-scale security breach” caused by a stolen private key. The breach led to the theft of more…
Popular browsers vulnerable to Cross-site leaks
14 new cross-site data leakage have been uncovered by researchers. The attack affects most of the modern web browsers: Mozilla Firefox, Google Chrome, Microsoft…