administrator

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setu virus contact-tracing app

Late-night notifications come as opposition labels app ‘surveillance system with no oversight’ The Indian government has acknowledged “potential security issues” in the Aarogya Setu contact-tracing app which its opposition labels as a “surveillance system with no oversight”, but says the code issues are not that big a deal. A late-night tweet from the team that […]

India acknowledges, but brushes aside, features-not-bugs in Aarogya Setu virus contact-tracing app Read More »

Criminals Selling Videoconferencing Credentials on Dark Web

Two security firms find thousands of usernames and passwords for Zoom accounts for sale and warn that the shift to remote work is changing attackers’ targets. As the number of cases of Zoom bombing has risen and companies lock down their videoconferencing calls behind passwords, attackers are now posting and selling videoconferencing credentials online, two

Criminals Selling Videoconferencing Credentials on Dark Web Read More »

How the basic Nigerian email scam evolved into sophisticated malware attacks on corporates

Nigerian internet fraudsters, best known for romance scams and infamous business propositions from “Nigerian princes,” are now operating with a lot more sophistication. Last August, a major bust  by the Federal Bureau of Investigations (FBI) offered some insight into the growing scale and capabilities of Nigerian online fraudsters. Federal agents arrested 14 fraudsters operating within

How the basic Nigerian email scam evolved into sophisticated malware attacks on corporates Read More »

Interpol warns hospitals about COVID-19-based ransomware threat

Interpol is warning hospitals and healthcare organizations to be aware that cybercriminals are ramping up the number of ransomware attacks targeting their facilities. Although it did not provide any statistics, Interpol has noted a significant increase in attacks taking place while these medical facilities are expending all their energy battling Coronavirus. The agency has issued

Interpol warns hospitals about COVID-19-based ransomware threat Read More »

COVID-19 phishing campaigns reel in victims with stimulus fund lures

Email-based phishing schemes continue to trick victims with promises of coronavirus information, cures and vaccines, but now some fraudsters are also sending their targets lures related to the U.S. government-approved stimulus checks promised to most Americans. The latest evidence of this is a new report, authored by Abnormal Security, which details a scheme to impersonate a

COVID-19 phishing campaigns reel in victims with stimulus fund lures Read More »

FIN6 and TrickBot Combine Forces in ‘Anchor’ Attacks

FIN6 fingerprints were spotted in recent cyberattacks that initially infected victims with the TrickBot trojan, and then eventually downloaded the Anchor backdoor malware. Researchers say, two cybercriminal groups, FIN6 and the operators of the TrickBot malware, have paired up together to target several organizations with TrickBot’s malware framework called “Anchor.” The two threat groups joining

FIN6 and TrickBot Combine Forces in ‘Anchor’ Attacks Read More »

Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild

Cybersecurity researchers have discovered a new emerging IoT botnet threat that leverages compromised smart devices to stage ‘distributed denial-of-service’ attacks, potentially triggered on-demand through platforms offering DDoS-for-hire services. The botnet, named “dark_nexus” by Bitdefender researchers, works by employing credential stuffing attacks against a variety of devices, such as routers (from Dasan Zhone, Dlink, and ASUS),

Dark Nexus: A New Emerging IoT Botnet Malware Spotted in the Wild Read More »

Cybersecurity Firms Partner on Open Source Security Technology Development

A group of cybersecurity companies this week announced the Open Cybersecurity Alliance (OCA), a joint effort focused on the development of open source security technologies. Established with initial open source contribution from IBM Security and McAfee and formed under the OASIS (Organization for the Advancement of Structured Information Standards) international consortium, OCA brings together both organizations and

Cybersecurity Firms Partner on Open Source Security Technology Development Read More »

You cannot copy content of this page