Threat actors behind the recent Juspay data breach, which compromised 35 million of its users’ credit and debit card details, are now selling databases of three more India-based enterprises - ClickIndia, ChqBook, and WedMeGood on Darknet forums. ClickIndia is...
Security researchers from Malwarebytes found that state-sponsored North Korean threat actor group APT37 is using RokRAT Trojan in a new wave of cyber operations targeted against the South Korean government. APT37, also known as ScarCruft, Reaper, and Group123, has...
The U.S. intelligence agencies including the National Security Council (NSC), the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Director of National Intelligence (ODNI) have jointly established the Cyber Unified Coordination Group (UCG) to coordinate the investigation...
Google has always been at the forefront when it comes to authentication and security. And thus, with a view for the future of authentication, Google acquired reCAPTCHA in 2009. Like any other product, it had its shortcomings. But little did...
Security researchers from Intezer discovered a wide-ranging marketing campaign targeting cryptocurrency holders to pilfer their private keys and compromise their crypto wallets. Threat actors used maliciously crafted cryptocurrency-related apps, domain registrations, Trojanized applications, fake social media accounts, and a...
The Australian government is warning users about an ongoing malware campaign imitating the Australian Cyber Security Centre (ACSC). The cybercriminals are claiming to be ACSC officials, calling and emailing Australians to trick them into installing malware on their personal...
Google has started rolling out security fixes with its January 2021 security updates for Android devices. The latest security fixes will address 42 vulnerabilities in Android’s System component, 15 vulnerabilities in Framework, and over 19 vulnerabilities in Kernel, MediaTek,...
As per a recent finding of Bank Security, data of 10,000 American Express credit cardholders’ accounts from Mexico has been posted by a threat actor on one of the underground forums for free. Reportedly, the same threat actor, in...
Internet of Things (IoT) has become an easy target for threat actors. The rise of connected devices in our daily lives and unpatched flaws in them have created a security blind spot. Cybercriminals can launch a Zero-day attack to...
Mobile phishing is on the rise. And while most of us know what phishing is, let’s quickly define it to make sure we’re on the same page. Phishing is the fraudulent attempt to obtain sensitive information or data, such...














