Category

Brand Abuse

Brand Abuse Page 1

Hackers Brand Abuse Microsoft Dynamics 365 Steal Customer Data

Hackers use Microsoft Dynamics 365 to steal customer data

In a recent campaign, researchers discovered a group of threat actors that exploited the Microsoft Dynamics 365 Customer Voice’s survey feature to steal customer information. Companies that commonly use customer satisfaction surveys to review their feedback and collect data to develop work-related solutions are the most affected by this campaign. Based on reports, the threat...
Continue Reading
AICD Cybercrime Brand Abuse Eventbrite

The AICD organisation got struck by a cybercriminal attack

A cybersecurity conference conducted by Australia’s Institute of Company Directors (AICD) was compromised by a cybercriminal attack. The conference’s objective was to address the current cybercriminal events in Australia. The data breach event in Medibank and Optus has sparked concerns among leaders and high-profile personalities. The AICD also had some solid names expressing their support...
Continue Reading
Microsoft Exchange Email Server Zero Day Vulnerability Abuse LockBit Malware Ransomware

An MS Exchange zero-day was abused to deploy LockBit malware

A new zero-day vulnerability in MS Exchange servers has been recently investigated after several reported abuse of it enabled the launch of LockBit ransomware attacks on the compromised networks. In July 2022, researchers discovered that a threat actor used a web shell on a compromised MS Exchange server to elevate admin privileges to Active Directory,...
Continue Reading
JavaScript Backdoor Injected Comm100 Application Installer Chinese Hackers Malware Supply Chain Attack

A JavaScript backdoor gets injected into Comm100’s app installer

Recent news disclosed that China-based threat actors have been spreading a JavaScript backdoor through a malware-infected Comm100 Live Chat app installer. Comm100 is a company that provides communication solutions and customer service to its clients, serving over 200,000 organisations worldwide. According to reports on this issue, the threat actors had initially hacked into the firm’s...
Continue Reading
D-Link Router Vulnerabilities Moobot Botnet Operators Mirai DDOS

D-Link router vulnerabilities eyed by Moobot operators

The variant of the Mirai botnet called Moobot has reemerged in a new threat campaign that aims at the D-Link Router vulnerabilities. Based on reports, the botnet targets the old and the new flaws in D-Link routers. According to researchers, the attacks resurfaced in August, but it has not made any suspicious activities notable to...
Continue Reading
Security Flaw Dahua IP Cameras Hackers Spy ONVIF Vulnerability

A security flaw in Dahua’s IP cameras allows hackers to spy

Research shows that a vulnerability in Dahua’s Open Network Video Interface Forum or ONVIF standard implementation can allow attackers to take over the tech brand’s IP cameras. With a CVSS score of 7.4, the vulnerability tracked as CVE-2022-30563 could be exploited to compromise companies’ network cameras by reusing an unencrypted ONVIF interaction and replaying its...
Continue Reading
Windows 7 Calculator Software Exploit QBot Malware Sideloading Cyberattacks

Windows Calculator exploited by the QBot malware for sideloading attacks

QBot malware operators have been abusing the Windows Calculator to execute a sideloading attack to distribute malicious payloads on targeted devices. DLL sideloading campaign is an attack tactic that manipulates how the Dynamic Link Libraries are operated in Windows. The tactic includes impersonating DLL and keeping it in a folder from where the OS loads...
Continue Reading
Nvidia Brand Abuse Scammers Fake Giveaway Fraud Prevention Fraudsters Fake Websites

Nvidia brand used by scammers to conduct a fake giveaway

Fraudsters exploit a computer graphics processor firm Nvidia to conduct a fake giveaway scam to steal cryptocurrency funds from their targets that bite the bait. A report stated that the scammers are abusing the 30th anniversary of the firm by luring its targets with a 50,000 BTC free giveaway. Based on a recent analysis, the...
Continue Reading
Spectre BTI Branch Target Injection Cyberttack Campaign Retbleed Hardware Vulnerability AMD Intel

A new Spectre-BTI campaign dubbed Retbleed was discovered

Intel and AMD chips are yet to be prone to another Spectre-based speculative execution called the Retbleed campaign. Based on reports, both impacted companies have started releasing several threat mitigation measures to prevent the new threat campaign from infecting their customers’ chips. According to a research group, the threat actors could abuse two newly discovered...
Continue Reading
Linux OrBit Malware Stealing Information Threat Intelligence

Linux’s new OrBit malware is used for stealing information

Threat actors have used a new Linux malware called OrBit to steal information from Linux systems elusively. Moreover, the new malware is utilised to infect all operating processes on the compromised devices. The researchers first spotted the malware in a recent campaign. It hijacks shared archives to intercept function calls by creating changes to the...
Continue Reading
1 2 3 10