Category

Third Party Risk Assessment

Third Party Risk Assessment Page 8

Comcast Cable remote tv box set vulnerability exploit malicious code injection WarezThe Remote

Comcast Cable remotes and TV top box vulnerability

A recent update to TV top box software has been released by Comcast to its 18 million devices used at home for digital TV subscribers in the United States region. Affected devices are specifically the XR11 entertainment platform. This has been immediately patched after cybersecurity ethical hackers able to scrutinized and hacked its communication platform....
Continue Reading
finfisher surveillance spyware germany malware

FinFisher tech firm raided by Authorities over Spyware claims

A Munich-based company, FinFisher, was raided by the German investigating authorities because of alleged illegal exporting of its software outside UE, including Turkey. FinFisher is the firm behind the commercial surveillance spyware dubbed as “FinSpy.” This software is a spying tool that was legitimately intended for Law enforcement investigation and intelligence agencies. Its well-known customers include...
Continue Reading
Shenzhen Zhenhua Data Tech Data Leak compromised data china chinese company

Shenzhen Zhenhua Data Technology allegedly collected Data

Chinese data services company Shenzhen Zhenhua Data Technology is now being questioned with its database and its application called the Overseas Key Information Database or OKIDB. The company is owned by a government-backed military research company – China Electronics Technology Group (CETC). Wherein its CEO is a known supporter of hybrid and psychological warfare, which...
Continue Reading
ripple20 malware iot device industry internet of things antimalware hardware vulnerabilities

Ripple20 Malware highlights IoT Industry challenges

With the growing statistics and people being reliant on technology and devices connected through the internet, a new dreaded threat has been released for awareness of the public. Consist of 19 zero-day attack vulnerabilities for low-level TCP/IP software library that has been used to millions of devices manufactured, the report was collaboratively named ‘Ripple20’. Exploiting...
Continue Reading
rogue employee fraud prevention conspiracy russia

1 Million USD to go Rouge; How Rogue employees are made

Local Authority and the Federal Bureau of Investigation (FBI) recently apprehended in Los Angeles airport a 27-year-old Russian National for a violation of conspiracy to cause damage to a protected computer. The conspirator was named Egor Igorevich Kriuchkov, who visited the United States with a tourist visa to personally meet his contact or a rogue...
Continue Reading
capital one fined 8 million dollars 2019 data breach compromised data third party risk assessment

Capital One fined $80 Million for 2019 Data Breach affecting 106 Million Users

The Capital One Financial Corporation was fined by the U.S. Treasury Department for $80 million for last year’s hack that exposed the personal information of the 106 million credit card information of the bank. According to the Office of the Comptroller of the Currency, they were able to identify “numerous weaknesses” on the management of the bank’s...
Continue Reading
european union sanction cyber criminal cybercriminal crybercrime russia china north korea hacking group

European Union imposed first-ever sanction against hacker organizations

The first-ever sanction against Cybercriminals that are targeting European Citizens was imposed by the Council of the European Union. There were six individuals and three entities that were involved in various Cyber-attacks, such as WannaCry, NotPetya, and Operation Cloud Hopper. The six individuals involved include Chinese Citizens and Russian Nationals. Technology companies from Russia and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
zoom vulnerability vanity URL flaw exploit

Vanity URL: Newly discovered Zoom vulnerability

A cybersecurity researcher has recently discovered a flaw in Zoom conferencing software. The newly discovered Zoom vulnerability is relatively minor but it is easy to exploit the flaw. This flaw can allow mimicking an Organization and would trick employees divulging their personal and confidential information by using Social Engineering. As we all know, Zoom’s popularity...
Continue Reading
treck inc ripple20 vulnerability software vulnerabilities assessment iot internet of things

Treck Inc put Internet of Things in peril

You probably never heard of IoT or perhaps came across the term, and you might have never really known what it was. The  Internet of Things, aka IoT, is connecting any machine capable of connecting to the internet. Research from different experts shows that by 2021 there will be over 26 billion connected devices globally....
Continue Reading
1 6 7 8 9 10