Tuesday, December 6, 2022
HomeCyber Security BlogCyber Security News

Category: Cyber Security News

Related categories

ZLoader was an effective trojan that was used to distribute and activate payloads, such as ransomware.  It is a banking trojan that is an improvement from Zeus.
The fraud was perpetrated by hackers who gained access to the company's bank account and transferred the money to their accounts. The company has filed a police complaint and is investigating the matter.
Two Chennai residents were greeted with an SMS message claiming that their electricity bill was due. No one answered the number and when they called, the person on the other line asked them to pay up to 1500 to their GooglePay account.
When people are unemployed, they want to believe the next step towards their career is a work-from-home job posting Amazon ads for six-figure compensation. However, if the salary surpasses what they would expect to make in that position, it's likely a fake job scam.
The CPWD has received intelligence alerts about targeted attacks on its computers. Recently, the frequency of these alerts has increased. The Cyber-Physical Systems Security Committee is evaluating the root cause of security breaches and is seeking compliance reports.
The Hertzbleed Vulnerability is a serious security flaw that was discovered in April of 2014. The flaw gets its name from the fact that it affects the "heartbeat" extension of OpenSSL, which is used to keep alive the SSL/TLS connection between two systems.
Clop encrypts your data and forces the victim to pay a ransom for a key to recover it. However, the ransom can cost anywhere from $500 to $1500 in various cryptocurrencies.
Hacking of healthcare organizations, financial service companies, manufacturing, and utilities is on the rise. Threats such as phishing, malware, and credential stuffing pose the most severe risk of data breaches.
MountLocker typically spreads through email attachments or infected websites. Once it's on your computer, it will scan your hard drive for files to encrypt. Once it has encrypted your files, It then displays a ransom note asking you to pay a fee (usually in Bitcoin) to get the decryption key and recover your files.
A vulnerability called 'Follina' is allowing cyber attackers to get full system control of affected devices. Follina is a software vulnerability that allows attackers to utilize the remote template function on MSDT.