Cybersecurity News

Top Software Testing Services

Google Reveals That North Korean Hackers Are Targeting Security Researchers By Creating Fake Persona On Social Networks

As per Google’s recent Threat Analysis Group (TAG), a hacking group backed by the North Korean government has targeted cybersecurity researchers by leveraging their curiosity for the development of exploits and research for vulnerabilities. Google’s Threat Analysis Group is a security team of Google focused on hunting APT (Advanced Persistent Threat) groups. These bad actors…
Read more

Is It Impossible To Take Down TrickBot Permanently?

TrickBot, which is a prominent favorite tool for cybercrime groups, is a known banking Trojan that targets consumers as well as businesses for their valuable data such as account credentials, banking details, or PII (personal identifiable information), also capable of adapting environments and networks that it targets. TrickBot faced a takedown in November 2020, by…
Read more

iPhones Vulnerable To Zero-Click Spyware Attacks

36 Personal iPhones that belonged to Al-jazeera’s journalists were taken control of in a cyberattack that took place around July, August 2020. It is believed that the attack was done by nation-state-backed advanced persistent threats (APTs) groups probably belonging or linked to Middle-Eastern countries. The iMessage service of iPhone had a zero-day, exploited by attackers,…
Read more

A Tool Developed By A Cybercrime Group Creates Phishing Pages in Real-Time

A novel phishing toolkit has been developed by a cybercrime group that has the capabilities to change the logos and text of a phishing page in real-time to adjust with the environments of the targeted casualties. This phishing toolkit, named LogoKit, has already been conveyed in the wild as indicated by threat intelligence firm RiskIQ…
Read more

Emotet – World’s Most Dangerous Malware Turned Upside Down By The European Authorities

Law enforcement authorities from as numerous as eight nations destroyed the framework of Emotet, which is an infamous email-based malware for Windows, behind a few botnet-driven spam crusades and ransomware assaults over the past years. The planned takedown of the botnet on Tuesday was named Operation Ladybird, which was the consequence of a joint exertion…
Read more

Dark-Web Website Connected With The Netwalker Ransomware, Seized By Authorities

Authorities from the US and Bulgaria recently seized a dark web website which was utilized by the cybercrime group behind the Netwalker ransomware to distribute and sell the stolen/breached data. Nicholas L. McQuaid, the Acting Assistant Attorney General at the Criminal division of the Justice Department explained that “ransomware victims should know that coming forward…
Read more

New Family Of Credential Stealing Android Malware, Forewarns Italy CERT

Researchers recently unveiled a new family of credential stealing Android malware which exploits the Androids accessibility service to capture video and audio of activities going on the device display and steal credentials of the user. The malware was first found by the AddressIntel and was named Oscorp by Italy’s CERT-AGID. Researchers highlighted, “it should be…
Read more

Kaspersky Explains That Organizations In Africa Should Be More Alert And Better To Battle Cyber Attacks

Alerting your boss that your organization’s PC has been phished, survivors of a mission to acquire delicate data through false emails should be viewed as a corporate win rather than viewing it as a peril to your work. That is the adjustment in culture required at African organizations as cybersecurity threats thrive on the rear…
Read more

A Severe Gap Filled By Threat Hunting

Threat hunting is a practice or act of searching for cyber threats that may have slipped into your networks. It is a severe discipline that, nowadays, more and more organizations are utilizing to destroy hidden espionage campaigns/attacks prior to letting them breach data or perform malicious operations. Since threat hunting utilizes human knowledge and experience…
Read more

Researchers Discovered Hacking Of Azure Functions And Escaping Docker

Paul Litvak, a cybersecurity researcher at Interzer Lab, recently revealed an unfixed vulnerability in Microsoft Azure Functions that could be utilized by an aggressor to elevate rights and escape from the Docker container that is utilized for facilitating them (privileges). The discovery of the vulnerability occurred during the Intezer Lab’s examinations concerning the Azure compute…
Read more