HomeNews & UpdateCyber Security News

Cyber Security News

Related categories

It has been reported that the Bank of the West learned that their debit card tracking numbers and Personal Identification Numbers were jeopardized by skimmers installed in multiple ATMs. Reports show that although it seems as if Magecart attacks are less prevalent, they're still present.
ZLoader was an effective trojan that was used to distribute and activate payloads, such as ransomware.  It is a banking trojan that is an improvement from Zeus.
The CPWD has received intelligence alerts about targeted attacks on its computers. Recently, the frequency of these alerts has increased. The Cyber-Physical Systems Security Committee is evaluating the root cause of security breaches and is seeking compliance reports.
The Hertzbleed Vulnerability is a serious security flaw that was discovered in April of 2014. The flaw gets its name from the fact that it affects the "heartbeat" extension of OpenSSL, which is used to keep alive the SSL/TLS connection between two systems.
The group is believed to be made up of former members of the Russian military and intelligence services, has been linked to attacks on the Ukrainian power grid, the U.S. Democratic National Committee, and the French television network TV5Monde.
Clop encrypts your data and forces the victim to pay a ransom for a key to recover it. However, the ransom can cost anywhere from $500 to $1500 in various cryptocurrencies.
MountLocker typically spreads through email attachments or infected websites. Once it's on your computer, it will scan your hard drive for files to encrypt. Once it has encrypted your files, It then displays a ransom note asking you to pay a fee (usually in Bitcoin) to get the decryption key and recover your files.
A vulnerability called 'Follina' is allowing cyber attackers to get full system control of affected devices. Follina is a software vulnerability that allows attackers to utilize the remote template function on MSDT.
Its a spyware which collect information about online activities and send it back to the attacker. It's usually bundled with other software that you download from the internet and attacks Windows users.
They are best known for their attack on the Sony Pictures website in 2014, which resulted in the leak of several sensitive documents. The group has also been linked to hacks on the US military, the FBI, and some government websites.

RECENT POSTS