Several cybercriminal groups are taking advantage of the current Monkeypox outbreaks to deceive concerned victims into providing their data and critical information. Monkeypox has been a hot topic these past few months as it gives similar concerns to the COVID-19 virus. For this reason, several threat actors use this potential threat to make their attacks...Continue Reading
Prominent security researchers recently disclosed a security incident in a Ugandan stock exchange firm, Uganda Securities Exchange (USE), that involved the firm being caught leaking their customers’ and partner companies’ highly confidential information. The security incident happened upon a researcher’s routine scan of misconfigured databases within the Shodan search engine platform. During the scan, a...Continue Reading
Cybercriminals are trying to maximize their monetary profits, especially through mobile malware, as their attacks surface expands. Each year, the rise of the mobile malware rate has made cybercriminals more eager to abuse the opportunity. The malicious codes used for mobile attacks offer powerful features adopted by threat actors worldwide. Based on the latest statistic...Continue Reading
The Iranian sponsored cyber threat group, known as Lyceum, has recently attacked telecommunication service providers and ISPs in Africa and the Middle East using upgraded malware. Also, Saudi Arabia, Tunisia, and Morocco are all targeted by the Iranian threat group, but Israel is still ranked as the most attacked country of Lyceum. In the most...Continue Reading
Cybersecurity leaders have conducted a study that shows the alarming hike of domain name system (DNS) attacks against organisations for 2021. The survey result revealed that within the past 12 months, 72% of participants had experienced a DNS cyberattack. 61% of victimised organisations have suffered from multiple attacks, while 11% are attacked regularly. In terms of cyberattack recovery, one-third of the respondents said...Continue Reading
A Russian cybercrime group is using a modified Excel document for a ransomware campaign called MirrorBlast. MirrorBlast deploys a weaponized Excel document against several financial service organizations. The most notable capability of MirrorBlast is the stealthy attribute that resulted in a low detection rate of the campaign’s malicious Excel documents. The creators of these documents have...Continue Reading
The ransomware actors behind the destructive malware called TrickBot have appeared again. It is now equipped with new strategies designed to increase its foundation by expanding its dispensation channels. The expansion is to deploy another ransomware called Conti. According to a report, the orchestrator of this expansion is the ransomware gang known as Wizard Spider or ITG23. They have been identified to...Continue Reading
A Thai luxury hotel chain, Centara Hotels & Resort, has recently published a statement regarding a data breach suspected of being performed by a notorious group of threat actors behind a series of cyberattacks in the past weeks. Through the security team’s investigation, it was verified that the system of the luxury hotel chain had suffered a data breach, and the threat actors were able to access some customers’...Continue Reading
IronHusky, a Chinese-affiliated threat group, has been abusing the zero-day flaw of windows using the MysterySnail Rat. The threat actors have uncovered a zero-day existing inside the Windows’ system, expanding the privileges for taking over servers and garnering ransom-worthy data. The espionage campaign majorly affects the Windows client and server version, from Windows 7, Windows version 2008 up to...Continue Reading
LockBit ransomware has successfully attacked another victim once again, following the confirmation of Accenture, a global consultancy and IT firm that the threat actors recently victimised. The data breach incident was revealed through the firm’s fourth-quarter financial report. The IT consulting firm and its clients have been experiencing cybersecurity attacks such as phishing, data breach, and malware attacks against...Continue Reading