Sunday, December 5, 2021

Panasonic Suffers Data Breach After attackers access internal network

Tech manufacturing giant Panasonic has confirmed that its network was accessed illegally this month during a cyberattack.Panasonic has disclosed a security breach wherein an unauthorized third...

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process of protecting your endpoints, be...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Tech News

LinkedIn officially signs EU’s Code against Online Hate speech takedown

Microsoft-owned LinkedIn is committed to doing more for the quick removal of illegal hate speech on its platform in...

Transport for NSW confirms data theft in Accellion breach

Transport for New South Wales (TfNSW) has confirmed it will be affected by the cyberattack on the Accellion-run file transfer system.The Accellion system has...

Integrated police operations Center launched in Cyberabad

The Telangana State Police Public Safety Integrated Operations Centre claimed to be India's earliest and most incorporated police operations center with where 15,000 CCTVs...

83% of Top 30 US retailers have online vulnerabilities, cause security threats

Cyberpion published research now showing that nearly all (83 percent ) of those best U.S. retailers have links to some vulnerable third party advantage,...

Researchers bypass Windows Hello Biometrics Safeguards

Researchers have shown that it is possible to spoof and get through the Windows Hello facial recognition system used for passwordless logins on personal...

Chinese Cloud Hopper Attackers Use Zerologon at New Campaign

Chinese state-sponsored attackers are working a significant worldwide campaign against several verticals harnessing the Zerologon vulnerability, based on a new study from Symantec.APT10 is...

Latest News

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

Apple Releases patches for an actively exploited zero-day flaw in ios, macOS

Apple on Monday Release an urgent security patch for iOS,macOS, iPadOS, to address a zero-day flaw that has been actively exploited.Apple has revealed that...

Microsoft Releases Mitigations For New PetitPotam NTLM Relay Attack

Microsoft releases mitigations and advisory For the New PetitPotam NTLM Relay Attack that abuses a remote access protocol called Encrypting File System Remote Protocol...

Brazil is creating a cyberattack response network

Brazil is creating a cyberattack response network to promote rapid response to cyber threats and vulnerability through coordination between federal government agencies.Created by a...

Breaches and Incidents

Panasonic Suffers Data Breach After attackers access internal network

Tech manufacturing giant Panasonic has confirmed that its network was accessed illegally this month during a cyberattack.Panasonic has disclosed a security...

Hacker leaks the user Information of event management app Peatix

Over 4.2 million consumer accounts are made available for downloading online earlier this month.A hacker has leaked that this...

SonicWall firewall maker hacked Via Zero-Day Flaw in its products

SonicWall, who built the communications equipment, said on Friday night, he was investigating a security breach of his internal...

In Moscow, hackers hacked PickPoint Online Order Delivery Service checkpoints

Hackers attacked the checkpoints of this PickPoint online order shipping agency in Russia's capital Moscow.The accounts concerning the...

Cashalo users Data of 3.3 million sold on the dark web: NPC

Sensitive information of Cashalo users has been sold on the dark web, NPC said on Tuesday.The National Privacy Commission...

Security Culture

iOS, Windows 10, Chrome, and Lots of others fall at China’s top hacking Competition

Many of the top software programs are hacked with new and never-before-seen exploits at this season's version of this Tianfu Cup -- China's biggest...

GitHub fixes high Seriousness’ security flaw Seen by Google

Fourteen days after Google revealed a security defect in GitHub, the Microsoft-owned website has fixed the matter.GitHub has fixed a high seriousness security flaw...

Must Read

UK Authorities and other Researchers Invest £4m on Telephone hacking Program

Authorities and government researchers in the united kingdom have signed contracts worth over fifty 4m in the previous two years using an Israeli firm...

There was an average of 419 new threats per minute In Q2 2020

McAfee published a report analyzing cybercriminal activity associated with malware along with also the growth of cyber dangers from Q2 2020. In this time,...

Supply chain attacks are on the rise: NCSC warns

Addressing big business and government agencies, the UK's National Cyber ​​Security Center (NCSC) has issued a warning that attacks on software pipelines "could have...

The third malware Strain detected in SolarWinds supply chain attack

Security investigators have found another type of malware used by Russian attackers to loosen SolarWinds.CrowdStrike, one of two security firms investigating the burglary, sheds...

Android Messages are now End-to-End Encrypted

Google has announced that cumulative encryption (E2EE) will start rolling out on its own Messages platform, bringing it in line with competitions WhatsApp and...

Hackers hide web skimmer inside a website’s CSS files

Formerly, security researchers discovered internet skimmers (Magecart broadcasts ) within favicons, website logos, live chat rooms, and, most recently, in social networking sharing buttons.Within...

Featured News

NTT develops secure authentication method for Datacenters with Fath Mechatronics, peaq

NTT Global Data Centers EMEA has awakened with Fath Mechatronics and peaq to make a new sort of access control system for information centers....

US Senate Approves New Deepfake Bill

The US bill must now pass through the House of Representatives.US legislation mandating government study to deepfakes took a step nearer to becoming law...

Ongoing ransomware attack leaves systems badly affected, says Scottish Environmental Regulator

About a month after the first attack, the Scottish Environmental Protection Agency (SEPA) systems remained offline - and stolen information from the organization was...

Flash version was distributed in China after EOL installing adware

Although the Flash Player app has officially reached its final date on December 31, 2020, Adobe has allowed a local Chinese company to continue...

Qualcomm has signed up Sophos to secure 5G Snapdragon PCs

Qualcomm has signed Sophos to provide cybersecurity solutions for the next wave of 5G-enabled PCs.Announced on Tuesday, the American manufacturer said Sophos, a British...

Parking app ParkMobile experiences data breach of 21M Users

The popular mobile app that drivers use to pay and find available public parking in Pittsburgh and in other cities experienced a data breach...

Malware and Vulnerabilities

Google patches Chrome zero-day vulnerability exploited in the wild

Google has released today Stable version 88.0.4324.150 of the Chrome browser for Windows, Mac, and Linux. Today's release contains only one bug fix for...

Firefox, Chrome, Edge Bugs Allows Remote System Hijacking

Major browsers get an upgrade to fix individual bugs which allow for remote attacks, which could potentially allow hackers to take over targeted devices.Makers...

Cyber Criminals Exploit zero-day vulnerability in FTA servers for Data Theft and Extortion

Cybersecurity company FireEye said today cybercriminal gang known as FIN11 performed a zero-day attack on Accellion FTA servers that hit 100 companies worldwide in...

A new Breed of card skimming Grelos malware is on the loose

Magecart Version has Shifted and You Ought to be Attentive, warns RiskIQA new offshoot of this Grelos card-skimming malware - a more standard Magecart...

Threat Actors

Malware Produces scam online stores on top of hacked WordPress sites

The malware gang poisoned the victims' XML sitemaps with tens of thousands of scammy entrances, lowering the websites' SERP ranking.A brand new cybercrime gang...

Europol: Beware Fake Dark Web COVID19 Vaccines

Since the UK starts preparations to set up a COVID-19 vaccine, law enforcers are warning of fake versions circulating on the Darknet.After departure from...

North Korean hackers launch RokRat Trojan campaigns against the South Korean government

A North Korean hacking team is using the RokRat Trojan in a new wave of campaigns against the South Korean government authorities.The Remote Access...

Latin American crime cartels turn to crypto to clean up their cash

Back in April 2019, Mexican authorities detained suspected human trafficker Ignacio Santoyo at a lavish area of this Caribbean resort of Playa del Carmen...

New Cyber Technologies

Google launches Cloud Armor Adaptive Protection Technologies to prevent DDoS attacks

Google LLC said now it is progressing smart automation inside its cloud network security controls within its continuing mission to shore up its clients'...

NTT develops secure authentication method for Datacenters with Fath Mechatronics, peaq

NTT Global Data Centers EMEA has awakened with Fath Mechatronics and peaq to make a new sort of access control system for information centers....