Customer Service Desk: An Easy Access For Hackers To Exploit Your Organization

The Customer service week which holds every 1st week of the month of October has come to be recognized as the week we celebrate the importance of customer service and importance of the people who serve and support customers on a daily basis. However in all of these celebrations lest we get carried away, do […]

Customer Service Desk: An Easy Access For Hackers To Exploit Your Organization Read More »

Fake Amnesty International Antivirus Hacking Systems Now Currently In Circulation

In yet another indicator of how hacking groups are quick to capitalize on world events and improvise their attack campaigns for maximum impact, threat actors have been discovered impersonating Amnesty International to distribute malware that purports to be a security software designed to safeguard against NSO Group’s Pegasus surveillanceware. Hacking groups have never failed at

Fake Amnesty International Antivirus Hacking Systems Now Currently In Circulation Read More »

Demodex: The New Rootkit Used by Chinese Hackers to Spy on Targeted Windows 10 Users

An operation aimed at South East Asian targets back in July 2020 to deploy a kernel-mode rootkit on compromised Windows systems has been linked to a Chinese-speaking threat actor. The hacking group nicknamed GhostEmperor by Kaspersky has been known to use “sophisticated multi-stage malware framework” allowing a persistent and remote control over the targeted hosts.

Demodex: The New Rootkit Used by Chinese Hackers to Spy on Targeted Windows 10 Users Read More »

A Current Flaw in Apple Pay is Enabling Attackers Perform Unauthorized Contactless Payments

An unpatched flaw in Apple Pay has been disclosed by Cybersecurity researchers giving attackers the ability to make an unauthorized Visa payment with a locked iPhone via the Express Travel mode setup in the device’s wallet. All that is needed is the mobile phone to be on and also transactions could be relayed from an

A Current Flaw in Apple Pay is Enabling Attackers Perform Unauthorized Contactless Payments Read More »

Hotels and Governments Worldwide New Targets of Hacker Group

FamousSparrow as nicknamed by the cybersecurity firm ESET has been attributed as being responsible for strings of attacks against hotels across the world, government international organizations and law firms worldwide. This has been said to be active since August 2019 with victims spreading across Africa, Asia, Europe and the Middle East with countries such as

Hotels and Governments Worldwide New Targets of Hacker Group Read More »

Feds Sanction SUEX for Aiding Ransomware Gangs

The U.S. Treasury Department on Tuesday imposed sanctions on Russian cryptocurrency exchange Suex for helping facilitate and launder transactions from at least eight ransomware variants as part of the government’s efforts to crack down on a surge in ransomware incidents and make it difficult for bad actors to profit from such attacks using digital currencies.

Feds Sanction SUEX for Aiding Ransomware Gangs Read More »

Sidewalk Malware Attacks Linked to Grayfly Chinese Hacker Group

A previously undocumented backdoor that was recently found targeting an unnamed computer retail company based in the U.S. has been linked to a longstanding Chinese espionage operation dubbed Grayfly. In late August, Slovakian cybersecurity firm ESET disclosed details of an implant called SideWalk, which is designed to load arbitrary plugins sent from an attacker-controlled server,

Sidewalk Malware Attacks Linked to Grayfly Chinese Hacker Group Read More »

WIndows Users are Currently Targets of New 0-Day Attack Exploiting Microsoft Office Documents

An actively exploited zero-day flaw Tracked as CVE-2021-40444 (CVSS score: 8.8), has been discovered to be impacting Internet Explorer. The remote code execution flaw is rooted in MSHTML (aka Trident), a proprietary browser engine for the now-discontinued Internet Explorer and which is used in Office to render web content inside Word, Excel, and PowerPoint documents.

WIndows Users are Currently Targets of New 0-Day Attack Exploiting Microsoft Office Documents Read More »

Hackers Take To Distribution of Jupyter Malware Version via MSI Installer

The evolution of Jupyter, a .NET infostealer has been reported by Cybersecurity researchers. This is known for going at healthcare and education sectors, making it exceptional at defeating most endpoint security scanning solutions. Morphisec underscores that the malware has not just continued to remain active but also showcases “how threat actors continue to develop their

Hackers Take To Distribution of Jupyter Malware Version via MSI Installer Read More »