Browsing tag

Security

Telecom giant behind routing SMS discloses 5-year-long data breach

Syniverse, the targeted telecom firm, works with carriers like T-Mobile, Verizon, Twilio, and AT&T in routing SMS text messages exchanged between them and carriers abroad. Syniverse, the well-known telecom giant, revealed to the Securities and Exchange Commission that hackers infiltrated its systems for more than five years. As a result, millions of cellphone users’ data […]

Twitch data breach resulted from server configuration error

Twitch Data Breach took place a couple of days ago when an anonymous hacker published a torrent file with 125 GB worth of data on the 4chan messaging board. As reported by Hackread.com, Amazon.com’s live streaming e-sports platform, Twitch, was a victim of a massive data breach where the company reportedly was hacked in its […]

GriftHorse Android malware hit 10 million devices in 70 countries

GriftHorse malware uses malicious apps to subscribe victims to premium services that cost them $42 (£30 –€36) per month. The IT security researchers at Zimperium Labs have reported an Android malware campaign affecting devices around the world to carry out financial scams and steal user data. According to researchers, nearly 10 million devices across 70 […]

Apple AirTags can be used as trojan for credential hacking

According to security researcher Bobby Raunch, the attack exploits the way Lost Mode of AirTags is set up. Although Apple’s Bluetooth-enabled item trackers called AirTags are pretty helpful as you can attach important objects like wallets or keys to prevent them from going missing, they are still vulnerable to hacking and not entirely trustworthy. According […]

Hackers exploit 2FA flaw to steal crypto from 6,000 Coinbase users

Coinbase is working to reimburse the customers for the funds they have lost and help them regain control of their accounts. Coinbase Global Inc. has sent a breach notification letter to its customers affected by the cyberattack on the widely used cryptocurrency exchange. As per the letter, hackers managed to steal accounts of at least […]

Android flubot malware installs itself by faking security update

The security update is obviously phony but looks authentic that can deceive users into installing Flubot malware on their devices. New Zealand’s Computer Emergency Response Team (Cert NZ) has issued a new warning involving the spread and infection of the infamous Flubot malware known for its password stealing capabilities. According to authorities, the threat actors […]

Cybersecurity risk assessment: Does Your Company Need It?

Cyber security risk assessments are a framework for detecting, analyzing, and prioritizing operational risk – Let’s dig deeper into why your company needs it more than ever. What is a Risk Assessment? Understanding, monitoring, controlling, and reducing cyber risk throughout your company is the goal of a cybersecurity risk assessment. It’s an important element of […]

Security tips – How to protect your online trading account

According to a report from The Economic Times India, cybercriminals are targeting stock markets. Their modus operandi includes selling penny stocks from their account and purchase them from a hacked account. In this way, the original investor/owned of the hacked account ends up losing the money. In any case, you need to find the right broker […]

Bandwidth.com is latest victim of nonstop DDoS attacks against VoIP

Bandwidth.com has been suffering DDoS attacks for the past 3 days nonstop. Bandwidth.com is the newest victim of DDoS attacks, explicitly targeting voice over Internet Protocol (VoIP) services providers. According to sources, the attack against Bandwidth caused countrywide voice and message services outages. The attackers are yet unidentified. SEE: Yandex hit by largest DDoS attack […]

Choosing a web hosting service that’s right for your business

With a web hosting service, a small business can focus on what its website should look like, what information it wants to communicate. Whenever a website is launched, it requires a place to store the website’s data. This data associated with the website has to be stored on a dedicated digital storage space, which is […]

Hackers hit Russian ministry, rocket center using MSHTML vulnerability

Microsoft Office zero-day also dubbed MSHTML attack exploited to target Russian government including Interior ministry and State Rocket Center. Malwarebytes Intelligence team reports that the MSHTML vulnerability classified as CVE-2021-40444 has become the focus of threat actors targeting Russian government entities. Malwarebytes researchers intercepted phishing email attachments revealing that attackers were trying to target Russian organizations. The […]

Urgent Chrome security update released to patch widely exploited 0-day

The vulnerability (CVE-2021-37973) impacts 2 Billion Chrome users worldwide therefore update your browser right now to the latest version. On Friday 24th, Google rolled out an urgent security update to patch a zero-day vulnerability in its Chrome web browser actively exploited in the wild. Google Threat Analysis Group’s Clément Lecigne reported the flaw. Update your […]

Lithuania wants users to dump Chinese phones citing data collection

Lithuania’s Defense Ministry has released a warning, urging consumers to get rid of their Chinese phones and not to buy new ones. This warning comes in response to Lithuanian cybersecurity researchers identifying several security flaws and censorship-related loopholes in certain Chinese-made smartphones. Hackread.com has learned that researchers tested 5G mobiles from different Chinese mobile makers, […]

Dangers of DNS poisoning and how to prevent it

The cyberworld is constantly evolving, and with evolution comes new methods of committing crimes. DNS poisoning is one such threat that might not get the attention it deserves. The increase in cybercrimes has impacted businesses globally while companies spend millions of dollars on preventing cyber-attacks. But, still, 68% of the business leaders feel that their […]

SSID Stripping flaw lets hackers mimic real wireless access points

SSID Stripping has emerged as a significant threat because it impacts almost all software platforms, including MS Windows, macOS, Apple iOS, Ubuntu, and Android. A Team of researchers at AirEye in collaboration with Technion – Israel Institute of Technology’s Computer Science faculty, have discovered a vulnerability that changes a network’s name (which is actually SSID […]

Fake TeamViewer download ads distributing new ZLoader variant

The infection chain starts when the victim clicks on an ad from Google on the search results page. SentinelLabs researchers have identified a new targeted campaign delivering ZLoader banking trojan. The malware is also known as ZBot and Silent Night which has been spreading its infection since 2016. It is worth noting that ZLoader was a […]

Anonymous hacks Texas Republican Party website against abortion law

The Texas Republican Party is now asking for donations to secure its website from further attacks from Anonymous and “Pro-abortion activists.” The official website of the Texas Republican Party was hacked and defaced by the Anonymous hacktivist collective on Saturday the 12th. The group carried out the cyber attack to protest the new abortion law […]

Download Kali Linux 2021.3 with Kali NetHunter on smartwatch, new tools

Kali Linux 2021.3, comes with a range of new pentest tools, improved virtualization support, and a brand-new OpenSSL configuration to enhance the attack surface. The new version of Kali Linux, a tool designed for cybersecurity experts and ethical hackers to carry out security audits and penetration testing, has been released by Offensive Security. According to the company’s […]

How to use VPN to access blocked websites?

Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one can use VPN to access blocked websites. If your country censors the internet and blocks sites like Facebook, Twitter, or YouTube then a VPN is what you need. When a user visits a […]

Virginia National Guard suffers cyberattack as Marketo leaks data

Email accounts linked with Virginia National Guard were targeted in the cyberattack. According to details shared by the representative of the chief of public affairs for the Virginia National Guard, A. A. Puryear, in July, email accounts linked to the Virginia Department of Military Affairs, and the Virginia Defense Force, were affected by a cyberattack. […]

Shared clinical workstation security and access

The shared clinical workstations in the healthcare sector are often chaotic and messy. They are used by physicians for nearly everything, from logging into the EHR system to scheduling surgery. With so much going on in such a fast-paced industry, IT teams need to be vigilant and aware of security risks. Risks of Sharing Clinical […]