Browsing category

Leaks

Samsung Sued Over Recent Data Breaches

Two Samsung customers, who are being represented by Clarkson Law Firm, have launched a class action lawsuit against the electronics maker for the two data breaches it had in 2022. According to the 43-page complaint submitted to the Federal District Court for the Northern District of California, Samsung gathered user data without authorization, stored and […]

Vulnerabilities in the iBoot Power Distribution Unit Let Hackers Remotely Shut Down Devices

Researchers found serious flaws in Dataprobe’s iBoot power distribution unit (PDU), which may be used by hostile parties to remotely hijack the device and shut down any connected devices, possibly disrupting the targeted business. Researchers from the industrial cybersecurity company Claroty discovered a total of seven flaws with the iBoot-PDU product, including one that might […]

novoShield Emerges From Stealth With Mobile Phishing Protection App

With an enterprise-grade iPhone protection app, mobile phishing defense firm novoShield has come out of hiding. According to novoShield, the new solution was created to shield organizations and end users against the rising amount of phishing attempts. With its real-time protection solution, novoShield seeks to address the considerable rise in cybercrime, including phishing, brought by […]

FBI Issues Warning About Increase in Attacks Against DeFi Platforms

The FBI has issued a warning about an uptick in hacks aimed at stealing cryptocurrencies from decentralised finance (DeFi) services. The government claims that criminals are using the rising popularity of cryptocurrencies, the open source nature of DeFi platforms, and their intricate functionality to carry out malicious deeds. According to the FBI, cybercriminals are taking […]

Security Firm Discloses CrowdStrike Issue After ‘Ridiculous Disclosure Process’

Following what it referred to as a “ridiculous vulnerability disclosure process,” a security company has revealed the specifics of a problem with a CrowdStrike product. Following the disclosure, CrowdStrike clarified a few things. An flaw with CrowdStrike’s Falcon endpoint detection and response tool was uncovered by researchers at the Swiss security firm Modzero. In particular, […]

Ring Android app flaw allowed access to camera recordings

In the Amazon Ring app for Android, Amazon has patched a high-severity vulnerability that may have let hackers download customers’ recorded camera footage. The flaw was spotted and reported to Amazon on May 1st, 2022 by security researchers working for the application security testing company Checkmarx. The flaw was quickly repaired by Amazon after it […]

This New Malware Is Now a Favorite among Ransomware Gangs

According to cybersecurity researchers, the bumblebee loader is now a darling in the ransomware ecosystem.  A new malware is now an important component when it comes to engineering ransomware attacks. The malware, which goes by the name Bumblebee, was recently analyzed by Symantec researchers. According to the cyber security researchers, Bumblebee is linked to ransomware […]

The Great Resignation in the Tech Sector and Tips to Solve the Issue

Human resource managers are finding it hard to close the growing skills disparities in their companies. For many, the issue is that the conventional method of addressing skills shortages has started to lose its effectiveness. Hiring developers, cloud professionals, and cybersecurity specialists are at a rate that implies every firm on the planet appears to […]

Attackers Can Exploit Critical Citrix ADM Vulnerability to Reset Admin Passwords

Citrix announced on Tuesday that Citrix Application Delivery Management (ADM) has a serious vulnerability that might allow an unauthorized attacker to enter as administrator. Citrix ADM is a centralized management solution that gives you access to your application delivery system and automates administration tasks. It’s set up as a server that connects with agents on […]

Owl Labs Patches Awful Exposure in Video Conferencing Applications

Owl Labs, an organization that deals in video conferencing, has announced severe exposure to its devices, including the Whiteboard Owl and Meeting Owl Pro. These two softwares allow people to set up important meetings regardless of where their team is located. Users can share documents, e-mails, chat and even conduct real-time polls. They can also […]

A Ransomware Group Claims to Have Breached the Foxconn Factory

Malicious hackers claim to have hacked into the network system of the Foxconn Baja factory in Mexico on June 11. using the LockBit 2.0 ransomware to conduct the cyber-attack, the hackers threaten to expose stolen files unless the company pays a ransom.   The factory specializes in manufacturing, consumer electronics, medical devices, and industrial operations. Based […]

Chrome 102 Patches 32 Vulnerabilities

Google is preparing to promote Chrome 102 to take its place after releasing Chrome 101 just over a month ago. The new Chrome release is chock-full of developer-oriented features, which isn’t necessarily negative. Instead, it means that online programs and applications will only get more powerful in the next few years.  More web app improvements, […]

Large-Scale Attack Targeting Tatsu Builder WordPress Plugin

Hackers are reportedly targeting WordPress sites that use an unknown security version of the Tatsu no-code website builder plugin. As part of a massive attack attacking a vulnerability in the Tatsu Creator plugin, a vast number of WordPress websites could be compromised. The vulnerability, identified as CVE-2021-25094, also known as the CVSS score of 8.1, […]

Microsoft: The Ransomware ware is Changing, Here’s What You Need to Know

Microsoft has highlighted RaaS, also known as ransomware as a service, as a criminal company relying on freelancers and is designed to spread the risk.   Microsoft security professionals track over 35 separate ransomware attacks and 250 threats. RaaS, it claims, is a new economy centered on three main pillars and engaging various actors.   RaaS has […]

Vulnerabilities That Allow Hijacking of Most Ransomware to Prevent File Encryption

A cyber-attack is a malicious attack undertaken by cybercriminals against single or numerous computers, computer systems, networks, or infrastructures utilizing one or more computers. The goal is to interrupt the victim’s business operations or steal important information. Individuals, corporations, governments, and critical infrastructure are potential cyber-attack targets. To breach a company, ransomware attackers utilize a […]

A Step-By-Step Guide on How To Remove Ransomware?

Prevention is always recommended when it comes to ransomware infections. Nevertheless, there are numerous ways to recover lost data whenever a device is compromised. Learn how to remove ransomware in four key steps. Ransom virus, often known as ransomware, blocks users from gaining access to their computer or personal documents and requests payment in exchange […]

Guide to Remove Ransomware

Ransomware is malicious software that encrypts your files and demands a fee in exchange for access. This type of malware is now the most profitable form of cybercrime since victims feel compelled to pay, even if there are no guarantees that their data will be recovered. Whether the victim is a one-person firm or a […]

7 Ransomware Protection Tips to Help You Secure Data in 2022

There were 2690 reports of ransomware attacks in 2021, which was a 97.1% increase on 2020 levels. Ransomware is malicious software that infects a personal or organizational computer and then holds information for ransom until the affected party pays some money. Ransomware cost businesses and individuals $18 billion in 2020, with the average sum paid […]

Best Ransomware Protection

Ransomware attacks targeting governments, businesses, hospitals, and private individuals are rising. It has become a vast online issue that affects individuals and businesses alike. You are neither safe on your private nor public network, as ransomware can encrypt your files and hold them hostage. As a result, you have to pay ransom to unlock them.  […]

CISA Cautions of Attacks on UPS Devices

The Energy Department and the US Cybersecurity and Infrastructure Security Agency (CISA) published guidelines this week on preventing attacks on UPS units. Threat actors are targeting UPS units that are linked to the net, typically using the original login authorizations, and the two government agencies advise disabling the access to the net by the information […]