Emerging Threats in the Digital Age: Spice Up Your Cybersecurity
In a world where technology rules, emerging threats in the digital realm are like hidden landmines, waiting for the right moment to explode. Cybercriminals are continuously evolving, and their tactics are getting more sophisticated. To stay ahead of the game, it’s essential to understand the hottest emerging threats in the cybersecurity landscape. So, grab your […]
Android Users, Beware! Government’s Urgent Warning – Is Your Smartphone on the Hit List?
For Android enthusiasts, the Indian government has sounded the alarm on a pressing issue, affecting popular smartphone giants such as Google Pixel, Samsung, and OnePlus, among others. There’s a red flag waving over Android OS versions 11, 12, and 13, with multiple security vulnerabilities that could expose sensitive data to cybercriminals. Who’s waving this flag? […]
Alarming Rise in Cybercrime: Bengaluru’s Rs.470 Crore Battle Against Fraudsters
In recent months, Bengaluru residents have faced a growing threat from cyber fraud, resulting in significant financial losses. This blog post delves into the data, revealing a daily loss of Rs 1.7 crore over a nine-month period. Let’s explore the various online scams, law enforcement efforts, and what you can do to stay safe in […]
ISRO faces over 100 hacking attempts daily! Here is a report
The Indian Space Research Organization, known as ISRO, deals with more than 100 cyber attacks every day. The Chairman of ISRO, S Somanath, shared this information during a recent cybersecurity event in Kochi. He explained that not only ISRO but also other organizations face hundreds of attempts by hackers to break into their computer systems. […]
Android devices are being exploited by hackers with RATs
The threat actor behind the BlackRock and ERMAC Android banking trojans has unleashed yet another malware for rent called Hook that introduces new capabilities to access files stored on the devices and create a remote interactive session. ThreatFabric, in a report, characterized Hook as a novel ERMAC fork that’s advertised for sale for $7,000 per […]
Warning: Tainted VPNs are Distributing EyeSpy Monitoring Software
A compromised VPN installer is used to distribute surveillance software called EyeSpy as part of a malware campaign launched in May 2022. It uses “SecondEye’s component (a legitimate surveillance application) to spy on users of Iran-based VPN service, 20Speed VPN, via trojanized installers,” said Bitdefender in its analysis. The US Romanian cybersecurity firm added that […]
Permissions matter for SaaS Security – Why?
Earlier this year, attackers compromised Mailchimp, a popular SaaS email marketing platform. We examined over 300 Mailchimp customer accounts and exported audience data from 102 of them. The compromise was preceded by a successful phishing attempt that launched a malicious attack against an end-user of a Mailchimp customer. Three months later, Mailchimp suffered another attack. […]
Synology releases patch for critical RCE vulnerability affecting VPN Plus servers
Synology has released a security update to address a critical vulnerability in VPN Plus Server that could be used to take over an affected system. The vulnerability registered as CVE-2022-43931 has a maximum severity of 10 in the CVSS rating and was described as a write out of bounds error in the Remote Desktop feature […]
WhatsApp introduces proxy support to help users bypass internet censorship
Popular instant messaging service WhatsApp has introduced support for proxy servers in the latest versions of its Android and iOS apps. This allows users to avoid government-imposed censorship and internet shutdowns. “By choosing a proxy, he can connect to his WhatsApp through servers set up by volunteers and organizations around the world, allowing people to […]
Hackers use stolen banking information to trick victims into downloading BitRAT malware
A new malware campaign has been observed using sensitive information stolen from banks as bait in phishing emails to drop a remote access Trojan called BitRAT. An unknown attacker hijacked her IT infrastructure for a Colombian credit union and used the information to create a convincing decoy message to trick the victim into opening her […]