18.3 C
London
Wednesday, April 8, 2020
Home Cyber Attack

Cyber Attack

Cyber Attack

Phishing is still one of the widely used strategies by cybercriminals and espionage groups to gain an initial foothold on the targeted systems. Though hacking someone with phishing attacks was easy a decade ago, the evolution of threat detection technologies and cyber awareness among...
Ecuador officials have arrested the general manager of IT consulting firm Novaestrat after the personal details of almost the entire population of the Republic of Ecuador left exposed online in what seems to be the most significant data breach in the country's history. Personal...
Insecure Internet-connected devices have aided different types of cybercrime for years, most common being DDoS and spam campaigns. But cybercriminals have now shifted toward a profitable scheme where botnets do not just launch DDoS or spam—they mine cryptocurrencies as well. Smominru, an infamous cryptocurrency-mining...
The United States Treasury Department on Friday announced sanctions against three state-sponsored North Korean hacking groups for conducting several destructive cyberattacks on US critical infrastructure. Besides this, the hacking groups have also been accused of stealing possibly hundreds of millions of dollars from financial...
The Guardian's SecureDrop whistleblower submission site was targeted with a phishing page the attempted to harvest the unique "code names" for sources who submitted information using the service. SecureDrop is a service that media organizations can install on the Tor network in order...
Twitter today finally decided to temporarily disable a feature, called 'Tweeting via SMS,' after it was abused by a hacking group to compromise Twitter CEO Jack Dorsey last week and sent a series of racist and offensive tweets to Dorsey's followers. Dorsey's Twitter account...
Victims are being asked to download malware through visually-compelling fake update prompts Hackers are regularly using highly customisable online resources to add social engineering components to render their attacks more effective, according to new research from Malwarebytes. One website identified by the team features...
A new malicious Android remote access tool (RAT) called BRATA was reported by Kaspersky researchers, has infectedand spy from WhatsApp and SMS messages to Brazilian users. “BRATA” is a new Android remote access tool malware family. We used this code name based on its description – “Brazilian...
A new Trojan dropper dubbed xHelper was observed while slowly but steadily spreading to more and more Android devices since May, with over 32,000 smartphones and tablets having been found infected in the last four months. Trojan droppers are tools used by threat actors...
A computer hacker found with the personal data of about 165,000 people and described as a "one man cyber crime wave" has been jailed. Grant West, 26, from Sheerness in Kent, sent "phishing" emails pretending to be from Just Eat and extracted the details...
Cyber-Security is much more than a matter of IT
It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it