Category

Threat Intelligence

Threat Intelligence Page 11

mozi botnet iot internet-of-things traffic

Mozi Botnet responsible for IOT Traffic

The latest feast on the cybersecurity realm evolved on the recent report submitted to the community about the Mozi botnet infesting numerous internet-of-things (IoT) devices. After the discovery in 2019, cybersecurity experts observed that this variant of the Mirai botnet has been in circulation for 90% of botnet attacks from October 2019 to June 2020....
Continue Reading
Shenzhen Zhenhua Data Tech Data Leak compromised data china chinese company

Shenzhen Zhenhua Data Technology allegedly collected Data

Chinese data services company Shenzhen Zhenhua Data Technology is now being questioned with its database and its application called the Overseas Key Information Database or OKIDB. The company is owned by a government-backed military research company – China Electronics Technology Group (CETC). Wherein its CEO is a known supporter of hybrid and psychological warfare, which...
Continue Reading
us department of defense vulnerabilities software hardware dod white hat hackers vulnerability assessment

U.S. Department of Defense disclosure on vulnerabilities

A recent disclosure from the U.S. Department of Defense details has been announced to the public. This is about their infrastructure system’s critical and high severity vulnerabilities. The vulnerabilities can allow threat actors to exploit the systems by hijacking a subdomain, remote code execution, or view and capture data and files on a vulnerable machine...
Continue Reading
european union sanction cyber criminal cybercriminal crybercrime russia china north korea hacking group

European Union imposed first-ever sanction against hacker organizations

The first-ever sanction against Cybercriminals that are targeting European Citizens was imposed by the Council of the European Union. There were six individuals and three entities that were involved in various Cyber-attacks, such as WannaCry, NotPetya, and Operation Cloud Hopper. The six individuals involved include Chinese Citizens and Russian Nationals. Technology companies from Russia and...
Continue Reading
crackers perpetrators bruteforce attack password cracking gatecrash zoom meetings password threshold

Crackers gatecrash on Zoom meetings

With their regular website and app scanning, Cybersecurity researcher spotted an unusual patch released by Zoom Company. Zoom is a popular application that is usually used for voice and video conferencing by many prominent businesses worldwide. The in-depth analysis confirmed that the patch was their resolution to the recently discovered vulnerability of the application. The...
Continue Reading
cybercrimes cyber attack canada canadian population fraud prevention

Half Of the Canadian Population Were Preys of Cybercrimes

Recent statistics that were presented by the cybersecurity researchers of Canada, under one of its cybercrime body – Cybersecure Policy Exchange (CPX) shows that 57% has been victimized by different online fraud. This contrasts with other researchers that were reported in 2017, wherein they gauge that only 36% has become a victim of cybercrimes and...
Continue Reading
cyber attack exchange server vulnerability security policy enforcement email social engineering

Cyber attack on vulnerable Exchange Server

CVE-2020-0688 | Microsoft Exchange Memory Corruption Vulnerability A remote code execution vulnerability exists in Microsoft Exchange Server when the server fails to properly create unique keys at install time. Knowledge of the validation key allows an authenticated user with a mailbox to pass arbitrary objects to be deserialized by the web application, which runs as...
Continue Reading
treck inc ripple20 vulnerability software vulnerabilities assessment iot internet of things

Treck Inc put Internet of Things in peril

You probably never heard of IoT or perhaps came across the term, and you might have never really known what it was. The  Internet of Things, aka IoT, is connecting any machine capable of connecting to the internet. Research from different experts shows that by 2021 there will be over 26 billion connected devices globally....
Continue Reading
phishing emails bank of america antiphishing phishing solutions

Bank of America: Phishing emails bypassed the mail security

Experts still consider phishing as the most commonly used attack on the organization, and it tops all online surveys. Out of the 2,109 organizations recently hit by a cyberattack, over half were victims of phishing. Phishing is still the most widespread cyberattack in all countries except for Colombia, where it was the second most common...
Continue Reading
cpa canada data breach cyber attack

CPA Canada Falls Victim to Cyber Attack

Chartered Professional Accountants of Canada, or known as CPA Canada is a national organization, the largest of its kind in the world, governing and representing the accounting profession in Canada and around the world. They issue guidance, leadership, quality assurance standards for businesses, audits, and financial assurance all across the country and their clients all...
Continue Reading
1 9 10 11 12 13 14