Phishing Campaign with Blurred Images
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
For a few days, I’m seeing a lot of phishing emails that try to steal credentials from victims. Well, nothing brand new but, this time, the scenario is quite different :Read More →
The domain name’s new owners want $2.5 million to give it back. In common with many other vendors, TP-Link, one of the world’s biggest sellers of Wi-Fi access points and homeRead More →
ESET analyzes multiple samples targeting OS X every day. Those samples are usually potentially unwanted applications that inject advertisements into browser displays while the victim is browsing the web. For theRead More →
The security researcher from Government Lab Mohammed Adel has found a vulnerability in the UK Defence Gateway that exposes army data. The security researcher from Government Lab Mohammed Adel has foundRead More →
A second US man has pleaded guilty to stealing intimate pictures of celebrities using a phishing scam. Edward Majerczyk, 28, who resides in Chicago and Orland Park, Illinois, was chargedRead More →
Talos have observed a large uptick in the Zepto ransomware and have identified a method of distribution for the Zepto ransomware, Spam Email. Locky/Zepto continue to be well known ransomwareRead More →
It all started from a spam campaign. Figure 1 shows a campaign we picked up recently from our spam traps with a suspicious document file attachment. Notice how poor theRead More →
The Federal Investigation Agency in Pakistan is investigating a Chinese organization that is specialized in attacking ATM machines by using skimmer devices. A few days ago I reported the storyRead More →
Threat actors are known to switch targeted geographies from time to time, and it appears that a number have set their sights on Canada within a short time-frame. In theRead More →
Company also doesn’t support encryption backdoors. Via a statement from Steve Grobman, Chief Technology Officer for Intel Security, Intel has denied claims made by hardware security expert Damien Zammit, who detailedRead More →
When it comes to accessing public websites, Tor has an intrinsic security problem: though the nodes between your computer and the public internet are unable to see where the trafficRead More →
Thomson Reuters ‘working furiously’ to secure 2.2 million sensitive records. The terrorist database used by global banks and intelligence agencies World-Check has reportedly leaked online. The mid-2014 version of the databaseRead More →
Lizard Squad’s tool becomes very popular thanks to the millions of unsecured IoT devices ready for the taking. Security experts from Arbor Networks have uncovered over 100 botnets that areRead More →
IN THE PAST two years a group of researchers in Israel has become highly adept at stealing data from air-gapped computers—those machines prized by hackers that, for security reasons, areRead More →
Hackers have stolen $10 million from an unnamed Ukrainian bank, according to an independent IT monitoring organization. The Kyiv branch of ISACA, the Information Systems Audit and Control Association, reportedRead More →
In a seeming response to the recent Check Point investigative report, the Nuclear Exploit Kit shut down its entire infrastructure and ceased operation. Background The Nuclear Exploit Kit, one ofRead More →
Our security operations team investigate and mitigate multiple denial of service (DDoS) attacks every single day. One recent case caught our attention because of the intensity and duration of the attack, andRead More →
OurMine behind the hacking of Google CEO Sundar Pichai’s Quora account. In our recent article, we had reported that how new hacking group, OurMine have been targeting elite tech accounts aroundRead More →
The hacker is asking over $700,000 for the whole data. A hacker that goes by the name of TheDarkOverlord has put up for sale on the Dark Web three databases stolenRead More →
FOR YEARS HOLLYWOOD has waged a war on piracy, using digital rights management technologies to fight bootleggers who illegally copy movies and distribute them. For just as long, hackers haveRead More →