Recently, research revealed that two authentication bypass vulnerabilities were present in the unpatched Dahua cameras. The said vulnerabilities have a possibility of a remote attack from malicious threat actors. Meanwhile, Dahua Technology is a solution provider in the video surveillance industry. The security camera company covers various sectors such as banking and finance, industrial, retail, government,...Continue Reading
A team of researchers pursued a stealthy malware called FinFisher spyware, dubbed as FinSpy for short. Almost eight months of investigation in uncovering this 2011 malware that now packs different improvements and upgrades. What are the discoveries in this FinFisher malware? Based on the research, a highly sophisticated malware infection method is equipped in the latest version of Finspy malware. The attackers...Continue Reading
For October, Google releases the Android security updates. They address a total of 41 vulnerabilities that ranges between high and critical severity. Every fifth day of each successive month, Google releases a complete breakdown of the Android OS security patch. This also contains both framework and vendor fixes. Therefore, this update also includes the remedies for the ten...Continue Reading
Security experts have found a new Python ransomware campaign wherein corporate systems are encrypted within three hours. According to researchers, this attack is performed by threat actors who specifically target the ESXi platform so that they can encrypt the victim’s virtual machines. This new ransomware written in Python has been deployed in only ten minutes by the threat actors who have managed...Continue Reading
Forward Air, a logistic company that offers surface shipping, suffered a data breach from a ransomware attack that resulted in the exposure of its employees’ personal information and granted access to the attackers. The cybercrime group “Hades” was reported as the attacker against Forward Air last December 2020. The logistic company was forced to shut down its network, which disrupted their...Continue Reading
A technique was discovered last Thursday by academic institutions from the UK which tackles a bypass bug issue relating to mobile security of Visa and Apple payment processes that can result in fake contactless payments. The said mobile security issue is reported to be capable of bypassing the lock screen of Apple’s iPhone to intrude the device’s payment services and commit fraudulent transactions. ...Continue Reading
A new malware trick is reported to infect Android users by posing as a security update that users would need to download to protect their devices. However, this fake security update is the malware itself, which seems to be an effective way to scam people into downloading it unknowingly. FluBot malware can steal passwords, financial details, and more...Continue Reading
IT security professionals were surveyed by a certain institution to accurately understand the ins and outs of how COVID – 19 affects healthcare delivery organizations. This survey also helps them figure out how ransomware cyberattacks on patients’ information are being kept at bay by the HDOs. As for the research mentioned above, ransomware has already impacted healthcare organizations, causing grave...Continue Reading
Investigations have been conducted regarding the Pegasus spyware’s suspicious activities in monitoring civil rights agencies, government figures, and journalists all over the world to operate a new wave of cyberattacks. Pegasus is a spyware system built by NSO Group that allows reading text messages, tracking calls, and more ways of harvesting information from devices. Initially, spyware is offered as a tool to combat crime;...Continue Reading
Americans and Europeans are allegedly being spied on via Chinese smartphones, according to the Lithuanian government. The government of Lithuania warns people to get rid of any Chinese mobile phones from Xiaomi or Huawei, based on the recently published report regarding the security issues of 5G smartphones from China. Xiaomi seems to favor the Chinese...Continue Reading