Friday, July 23, 2021

OAIC: Uber found to have interfered with the privacy of over 1.2 million Australians

The Office of the Australian Information Commissioner (OAIC) has determined that Uber Technologies, Inc. and Uber B.V. have interfered with the privacy of over...

Over 80 US Municipalities data are exposed due to Misconfigured Amazon S3

A team of Cybersecurity researchers at Wizcase found major data exposure of Over 80 US Municipalities due to the Misconfigured Amazon S3 Bucket. This happened...

Formbook malware Upgraded as an XLoader malware to Attack macOS Systems

Researchers have spotted an upgraded malware variant of Formbook malware which is now Upgraded as an XLoader malware to Attack macOS Systems. Cybersecurity researchers on...

Millions of HP, Samsung, Xerox Printers are Vulnerable to 16 year old bug

A 16-year-old security vulnerability affects Millions of HP, Samsung, Xerox Printers Driver allows attackers to gain admin rights on systems using the vulnerable driver...

Tech News

LinkedIn officially signs EU’s Code against Online Hate speech takedown

Microsoft-owned LinkedIn is committed to doing more for the quick removal of illegal hate speech on its platform in...

Firefox ‘network partitioning’ as a new anti-tracking defense system roll out in Jan 2021

Firefox's "network partitioning" feature will roll out in v85, which is scheduled for January 2021. Firefox 85, scheduled to be rolled out next month, in...

Armed Forces confirm hacking of their data network

The Malaysian Armed Forces (ATM) verified that there was a cyber assault on its information network yesterday. Armed Forces chief General Tan Sri Affendi Buang...

IBM And Tanium Collaborates For Security Compliance for Hybrid Cloud

Tanium’s endpoint management and security platform allows customers to continuously evaluate, update, and to create a security and compliance monitoring solution for hybrid cloud. Tanium,...

Fearing drama, Mozilla opens public consultation Before Global Firefox DoH rollout

Mozilla has started now a public opinion and consultation period regarding how it might enable support for its contentious privacy-centric DNS-over-HTTPS (DoH) protocol within...

Latest News

MosaicLoader malware targets cracked software via SEO poisoning

New MosaicLoader malware targets users that are searching to download cracked software. Cybercriminals run ad campaigns in search engine results to boost their malicious...

U.S DOJ charges 4 Chinese nationals for the global hacking campaign

The Justice Department announced charges against four Chinese nationals on Monday, accusing the men of being part of a hacking group that attacked "companies,...

What is Pegasus spyware, It’s Working, and its News

Pegasus was developed by the Tel Aviv, Israel-based cyber intelligence and security firm NSO Group. Pegasus spyware is also known as Q Suite and...

China Released New Law Regarding vulnerability disclosure rules

The Cyberspace Administration of China (CAC) Released a New Law Regarding vulnerability disclosure rules that mandate security researchers to disclose them first to the...

Breaches and Incidents

Networking equipment vendor Belden Reveals data breach

Belden says hackers obtained a restricted number of the firm's servers. American media equipment seller Belden stated it had been...

Suspected Attackers Steal FireEye Red Team Tools

Security giant FireEye has been on the receiving end of a complex, publication attack from state actors searching for...

Sophos Informs customers of Information exposure after database misconfiguration

The company states that just a tiny subset of clients was affected. UK-based cyber-security seller Sophos is presently advising clients...

Cashalo users Data of 3.3 million sold on the dark web: NPC

Sensitive information of Cashalo users has been sold on the dark web, NPC said on Tuesday. The National Privacy Commission...

Hacker leaks the user Information of event management app Peatix

Over 4.2 million consumer accounts are made available for downloading online earlier this month. A hacker has leaked that this...

Security Culture

iOS, Windows 10, Chrome, and Lots of others fall at China’s top hacking Competition

Many of the top software programs are hacked with new and never-before-seen exploits at this season's version of this Tianfu Cup -- China's biggest...

GitHub fixes high Seriousness’ security flaw Seen by Google

Fourteen days after Google revealed a security defect in GitHub, the Microsoft-owned website has fixed the matter. GitHub has fixed a high seriousness security flaw...

Must Read

Countering Threat Data Overload: The Significance of Curation

Now cybersecurity professionals are confronted with the monumental challenge of navigating an increasingly intricate threat landscape. The mass change into a digital-first version amid...

Nvidia releases security update for high-severity flaws affecting Windows, Linux devices

NVIDIA has released security updates to address six security vulnerabilities found in Windows and Linux GPU screen drivers, as well as ten additional flaws...

The third malware Strain detected in SolarWinds supply chain attack

Security investigators have found another type of malware used by Russian attackers to loosen SolarWinds. CrowdStrike, one of two security firms investigating the burglary, sheds...

DoJ Says SolarWinds Attackers Has accessed its Microsoft O365 email server

Thousands of Department of Justice (DoJ) email accounts were accessed by SolarWinds attackers last year, the department has confirmed. The US Department of Justice is...

Hacker is selling passwords of the email accounts of hundreds of C-level executives

Access is offered for $100 to $1500 per account, based on the business size and exec role. A Threat Actor is presently selling passwords to...

Microsoft joins Space ISAC as a founding member to support cybersecurity

The Space Information Sharing and Analysis Center (ISAC) welcomed its newest member, Microsoft, on June 23 with an announcement highlighting the tech giant’s cybersecurity...

Featured News

Russia declines Microsoft claims of healthcare cyber attacks

Russia on Tuesday vehemently reduces claims by Microsoft that Russia was behind cyberattacks on businesses exploring coronavirus vaccines and remedies, stating that it had...

Fines Less of a Concern than Reputational Damage for Public Sector Security

In a survey of 250 UK public sector professionals working in cybersecurity, risk, and data protection by Zivver, 52% of all respondents cited reputational damage...

Ransom payments are declining as many victims decide not to pay

A high percentage of ransom victims choose to opt-out of pay the ransom amounts but don't assume that the ransom will go away anytime...

Countering Threat Data Overload: The Significance of Curation

Now cybersecurity professionals are confronted with the monumental challenge of navigating an increasingly intricate threat landscape. The mass change into a digital-first version amid...

Vietnam to shut down Facebook over censorship requests – Source

Vietnam has threatened to close down Facebook from the nation if it doesn't bow to government pressure to pay more local political material on...

UK police warn of sexual harassment in intimate online dating chats

There are people out there who are trying to take advantage of the only way to date during the epidemic. As politicians play whack-a-mole on...

Malware and Vulnerabilities

The fourth type of malware discovered in the SolarWind Hack

Symantec said it identified Raindrop, the fourth type of malware used in the SolarWinds breach, after Sunspot, Sunburst, and Teardrop. Cybersecurity company Symantec said it...

Critical bug found in Cortex XSOAR Allows Remote ‘War Room’ Access

A critical vulnerability in Palo Alto Networks, Cortex XSOAR system could have allowed an attacker to perform a command and control in the Cortex...

Nvidia releases security update for high-severity flaws affecting Windows, Linux devices

NVIDIA has released security updates to address six security vulnerabilities found in Windows and Linux GPU screen drivers, as well as ten additional flaws...

Firefox, Chrome, Edge Bugs Allows Remote System Hijacking

Major browsers get an upgrade to fix individual bugs which allow for remote attacks, which could potentially allow hackers to take over targeted devices. Makers...

Threat Actors

Attackers Targeting Unpatched Exchange Servers With DearCry Ransomware

Ransomware attackers are now targeting Exchange servers that haven’t received the patches that Microsoft released last week. According to the latest reports, cybercriminals are leveraging the...

Latin American crime cartels turn to crypto to clean up their cash

Back in April 2019, Mexican authorities detained suspected human trafficker Ignacio Santoyo at a lavish area of this Caribbean resort of Playa del Carmen...

This ransomware is growing in Strength and May become a threat researchers warn

Ransomware that necessitates millions of dollars from sufferers and has been updated with new attributes could develop into another significant threat to companies. As with...

North Korean hackers launch RokRat Trojan campaigns against the South Korean government

A North Korean hacking team is using the RokRat Trojan in a new wave of campaigns against the South Korean government authorities. The Remote Access...

New Cyber Technologies

Google launches Cloud Armor Adaptive Protection Technologies to prevent DDoS attacks

Google LLC said now it is progressing smart automation inside its cloud network security controls within its continuing mission to shore up its clients'...

NTT develops secure authentication method for Datacenters with Fath Mechatronics, peaq

NTT Global Data Centers EMEA has awakened with Fath Mechatronics and peaq to make a new sort of access control system for information centers....