It is an obvious fact that the Manufacturing sector and healthcare industry are under dynamic cyberattacks. The risk scope has developed drastically and things are deteriorating. Alongside these two, the IT domain has likewise gotten one of the highest focuses…
Latest posts - Page 91
Nepal Telecom call details: stolen by Chinese hackers
Nepal Telecom has been exposed to a horrible “cyberattack” from China. The telecom company has been assaulted by Chinese hackers and rob the call records of every single Nepali client. Hacking into the Oracle GlassFish Server utilized by the telecom…
Bug bounty of $14M has been paid by Microsoft in last 12 months
Per every filed report, the security researcher or bug bounty hunters received $10k on an average Microsoft has rewarded $13.6 million to security scientists or bug bounty hunters under their program for bug bounty in just the previous year alone. …
Cyberattack and Customer data leak and at Bank of Oak Ridge
GREENSBORO, N.C. Cyberattack — Bank of Oak Ridge, a local area bank in Piedmont-Triad, stated an “unapproved entity” got to banking client information in late April, driving the bank to advise government specialists and dispatch an examination. A representative with…
PDF attachments a long line of Phishing Campaign
Robbing corporate credentials is a worthwhile business in the black markets. Attackers have been found to go to different lengths to get those. Presently, another gang of cybercriminals has been noticed imitating Adobe PDF online services and utilizing counterfeit notices…
Netskope said their evaluation doubled or more to $7. 5 billion
Netskope stated on Friday its evaluation has increased to $7.5 billion after a $300 million subsidizing round driven by ICONIQ Growth, featuring monstrous interest for cloud security services as cyber crimes expand in number and seriousness. Other massive existing financial…
Credit card details stolen and hidden in images by Magecart hackers
Hackers of the Magecart cybercrime gang have hooked on to another method of jumbling the malware code inside the comment section and encoding robbed credit card information into pictures and different documents facilitated on the server, indeed showing how the…
Hackers use a new technique in malspam attacks
Hackers have come up with another stunt to hamper macro security cautioning that influences non-malicious docs in malspam attacks. A large portion of the malspam campaign influence weaponized Microsoft Office reports and social engineering strategies to fool beneficiaries into empowering…
Cybercrime forum used by an attacker to deposit $1Million to buy zero-day exploits
An attacker has saved 26.99 Bitcoins on one of the cybercrime platforms, he targets buying zero-day abusing from other forum individuals. The hacker that goes online with the name “Integra” has transferred 26.99 Bitcoins on one of the cybercrime forums…
APT SideCopy targeting Indian Government officials
Once corrupted, APT gang SideCopy utilizes some tools such as keyloggers, document enumerators, and others to rob data from the targets. They targeted web browsers such as Chrome and Opera and applications like CCleaner. They convey malware to casualties through…