The Dark Web: A Hidden Danger or a Valuable Resource?

dark_web_cybercure

The dark web is like a hidden treasure chest on the internet, but beware, for it’s filled with both wonder and peril. Imagine a place where secrets are traded and shadows whisper in anonymity. Today, we’re embarking on a journey into this mysterious realm. Our guide? Real stories that will shine a light on why […]

India’s Cyber Transformation: From Chaos to Control

cyber attacks

In the ever-evolving world of cybersecurity, staying up to date with the latest trends and statistics is crucial. The Microsoft Digital Defence Report for 2023 sheds light on the shifting dynamics of cyber attacks worldwide. In this blog post, we’ll explore the key findings of the report, highlighting how India’s cyber threat landscape has transformed […]

€5.5 million fine imposed on WhatsApp for data protection violations

On Thursday, Ireland’s Data Protection Commission (DPC) fined Meta’s WhatsApp a new €5.5 million for violating data protection laws when processing users’ personal data.  As a result of the ruling, the platform’s Terms of Service have been updated, requiring users to agree to the new terms in preparation for the General Data Protection Regulation (GDPR) […]

Android devices are being exploited by hackers with RATs

The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored on the devices and create a remote interactive session.  ThreatFabric, in a report, characterized Hook as a novel ERMAC fork that’s advertised for sale for $7,000 per […]

Warning: Tainted VPNs are Distributing EyeSpy Monitoring Software

A compromised VPN installer is used to distribute surveillance software called EyeSpy as part of a malware campaign launched in May 2022.  It uses “SecondEye’s component (a legitimate surveillance application) to spy on users of Iran-based VPN service, 20Speed ​​VPN, via trojanized installers,” said Bitdefender in its analysis.  The US Romanian cybersecurity firm added that […]

Permissions matter for SaaS Security – Why?

Earlier this year, attackers compromised Mailchimp, a popular SaaS email marketing platform. We examined over 300 Mailchimp customer accounts and exported audience data from 102 of them. The compromise was preceded by a successful phishing attempt that launched a malicious attack against an end-user of a Mailchimp customer.  Three months later, Mailchimp suffered another attack. […]

Synology releases patch for critical RCE vulnerability affecting VPN Plus servers

Synology has released a security update to address a critical vulnerability in VPN Plus Server that could be used to take over an affected system. The vulnerability registered as CVE-2022-43931 has a maximum severity of 10 in the CVSS rating and was described as a write out of bounds error in the Remote Desktop feature […]

WhatsApp introduces proxy support to help users bypass internet censorship

Popular instant messaging service WhatsApp has introduced support for proxy servers in the latest versions of its Android and iOS apps. This allows users to avoid government-imposed censorship and internet shutdowns. “By choosing a proxy, he can connect to his WhatsApp through servers set up by volunteers and organizations around the world, allowing people to […]

APT hackers use malicious Excel add-ins as an initial breach vector

Microsoft’s decision to block Visual Basic for Applications (VBA) macros by default in Office files downloaded from the Internet has prompted many attackers to improvise attack chains in recent months. Today, according to Cisco Talo, advanced persistent threat (APT) actors and the commodity malware family are increasingly using Excel extension files (.XLL) as their primary […]