From a recent report posted by Microsoft, the firm claimed that an Austria-based penetration testing company, DSIRF, was linked with selling spyware to clients that targets entities from Europe and Central America. A threat group called Knotweed was associated with the pentesting firm DSIRF, which has allegedly created and spread the Subzero malware against victims...Continue Reading
Statistical studies on ransomware incidents show that the value of extorted money from victims has dropped for the second quarter of 2022. The analysts also added that these findings were first noticed in last year’s fourth quarter. Despite the ransomware actors increasing their average ransom payments, more and more victims refrain from paying, thus resulting...Continue Reading
Researchers had recently published a study that estimated more than $343 billion to be lost worldwide in the next five years due to cybercriminal groups innovating their extortion, account takeover, hacking, and identity fraud tactics. The study highlighted that this estimate is possible despite organisations’ widespread use of cybersecurity and identity verification measures. Since people...Continue Reading
HackerOne, a vulnerability and bug bounty cybersecurity platform, had recently disclosed that one of its employees had hacked into the firm’s internal data to steal bug bounty reports and use them for side income purposes. Based on the reports about the incident, the suspect had unauthorised access to HackerOne’s internal data, which allowed them to...Continue Reading
Brazil’s law enforcement groups had commenced the fourth wave of Operation 404, which aimed to take down malicious websites and application piracy platforms. The country’s anti-piracy movement had enabled the Brazilian authorities to arrest several threat actors involved in the cybercrimes. About 226 websites and 461 pirated apps had been shut down and blocked under...Continue Reading
A malicious threat group targets the information security (Infosec) community with phoney Windows Proof-of-Concept vulnerability. These fake exploits compromise the targeted devices with a Cobalt Strike beacon backdoor. The threat actors operating these current attacks are taking advantage of the latest repaired Windows remotely controlled exploit flaws. Moreover, a threat actor published two Proof-of-Concept exploits...Continue Reading
The government of the United Kingdom has revealed its cybersecurity strategy for its upcoming civil nuclear sector. These plans are expected to increase security design and improve collaboration and troubleshooting. Experts stated that this move made by the UK government is a much-needed upgrade since their country boasts the oldest civil nuclear power program worldwide,...Continue Reading
The South African phone users have expressed their concerns about their data security after a proposal to put their biometric data on SIM cards was proposed by lawmakers in their country. A committee included the Independent Communications Authority of South Africa’s proposal in the list of draft regulations released by the watchdog for public commentary...Continue Reading
Phishing attacks from last year have broken previous records from the past years. Experts claimed that the emergence of phishing-as-a-service methods and new attack vectors caused this massive upsurge of the attacks. Some researchers also think that the low barrier of entry contributed to the widespread of similar attacks. Threat actors take advantage of current...Continue Reading