Browsing tag

cyber security news

Google Photos Vulnerability Allows Hackers To Track Location History

A vulnerability exists with the web version of Google photos allows malicious websites to extract the photos metadata information. Google photos will tag your photos automatically based on the metadata information such as geographic coordinates, date, etc. The Photo metadata allows information to be traveled along with the image file that can be read by […]

First Malware Campaign Exploits WinRAR ACE vulnerability To Hack Windows Computer

Researchers have detected the first malspam campaign that delivers a malicious RAR archive to infect victim’s computer exploiting the WinRAR ACE vulnerability. The 19-year-old vulnerability was disclosed by checkpoint security researchers last week, the vulnerability resides in the WinRAR UNACEV2.DLL library. This vulnerability can be exploited by an attacker with specially crafted ACE archive and […]

Hackers Targeted Retailing Industry With Malware and Selling Stolen Data On Dark Web

Hackers deploy Emotet malware targeting retail trading industry to exfiltrate the bundles of data and to sell them on the dark web. The Emotet malware is a highly sensitive banking malware which was originally found in 2014, it is capable of stealing financial credentials, usernames, passwords and email addresses. Panda Trading Systems detected the malware […]

Hackers Abusing LinkedIn’s Direct Messaging Service to Deliver More_eggs Malware via Fake Job Offers

A new malware campaign that impersonates as legitimate staffing companies abuse messaging services to deliver More_eggs malware. The campaign primarily targeted US companies that include retail, entertainment, pharmacy, and others that commonly employ online payments, such as online shopping portals. Threat actors send direct message abusing Linkedin message service to the victim’s pretending to be […]

Personal Data of 458,388 Delhi Citizens Exposed Online from an Unprotected Database

A database that contains highly sensitive information of about 458,388 individuals located in Delhi exposed for public access without any password protection. Security researcher Bob Diachenko discovered the publically exposed database name “GNCTD” that indexed by Shodan. The 4.1GB-sized MongoDB belongs to Government of National Capital Territory of Delhi and by analyzing contents Bob Diachenko […]

POS Security Solutions Provider Announced a Security Breach that Affects Number of Restaurants and Hotels

NCBP announced a security breach that impacts hundreds of restaurants, Retail, and Grocery point of sale systems. The security breach impacted 137 restaurants. According to North Country Business Products, Inc, following are the details exposed that include the cardholder’s name, credit card number, expiration date, and CVV. The company learned that there is suspicious activity in […]

ATM Robber Malware Turns ATM into Slot Machine to Dispense Cash Automatically

ATM hijacking malware dubbed WinPot turns the ATMs into a slot machine, which starts dispensing the cash based on SPIN button. Security researchers from Kaspersky observed the emergence of the WinPot malware, the malware appeared first in the underground markets in March 2018. Threat actors designed the malware to automatically dispense the cash automatically form […]

MetaMask – First Copy-and-Paste Hijacking Crypto Malware Found in Google Play

The clipper hijacking malware use to intercept the contents of the clipboard and replaces it with the content the attackers want to have. Generally, the cryptocurrency wallets contain a long string of characters for security reasons, users use to copy and paste the strings instead of typing it. Security researchers from ESET discovered the Android […]

Hackers Launching Gandcrab Ransomware via Super Mario Image Using Weaponized Excel Document

Cyber criminals now spreading a Gandcrab ransomware variant using Steganography Super Mario image via malicious Excel documents. Very recently a security researcher Matthew Rowen from Bromium encountered a spreadsheet that containing a trojan sample during the static analysis. The spreadsheet has an embedded macro and the code part reveals that the macro should exit immediately […]

Hackers Launching Ursnif Malware via Weaponized office Document Using Steganography Technique

Cyber Criminals now distributing powerful ursnif malware via malicious Office Documents with multi-stage highly obfuscated PowerShell scripts to bypass security controls. ursnif is a banking Trojan family that perform the most destructive attack on victims network and now it using the steganography method to hide its malicious code to avoid detection. Ursnif malware also known […]

CryptoMix Ransomware – Tricks Users to Pay Ransom for Helping Children

CryptoMix ransomware (old ransomware spotted early in 2016) returns with a new trick, ripping data and images from crowdfunding sites and claiming ransomware payments go to the needy. This old family of ransomware has returned with a new campaign which uses information about children stolen from crowdfunding websites and claims that payments made in exchange […]

Why Do Universities Sites Need DDOS Protection?

Universities and colleges are among the risk group that is mostly affected by the frequent DDOS attacks according to the latest research. For example, in the UK alone, more than 200 universities were hit by 850 DDOS attacks in 2018. This raises a major concern about the security of universities and colleges worldwide. The attackers […]