Tag: data breach
Emergency Directive! CISA Warns About Ivanti Pulse Connect Secure Vulnerabilities
Software programs often have flaws/vulnerabilities, which are often exploited by cybercriminals to gain access to victims’ data. Recently, federal agencies have been ordered to...
WhatsApp Pink and Fake Facebook Messenger Scams Explained
Cybercriminals often target businesses that hold large amounts of users’ sensitive information. And social networking services like Facebook and WhatsApp always top the list...
Chinese State-Actors Exploit Big Data for Financial Benefit
No doubt Big Data is helping organizations globally in growing their businesses at an unprecedented rate. It offers rich insights for decision-making and strategic...
CISOs are Struggling with Continuous Security Debts: Surveys
With the increase in the volume of cyberattacks, security leaders are changing their cybersecurity measures accordingly. However, cybercriminals too become consistent in advancing their...
Cybercriminals Enjoy a Cheesy Crust of Domino’s India through a Data...
Previously, a preliminary report from UpGuard had given Domino’s Pizza’s security posture a “B-grade” rating, based on the security folds implemented by the pizza...
Patch Now! Researchers Find Zero-Day Flaws in Google and Microsoft
The risks from cybercriminals exploiting zero-day vulnerabilities have become a continuous threat for organizations, globally. Recently, security experts from Kaspersky found a zero-day vulnerability...
Internet Swamped with Over 100K Pages Serving Malicious PDFs
Cybersecurity researchers found threat actors using search engines to lure business professionals into installing a Remote Access Trojan (RAT) inadvertently.
According to an analysis from...
Saint Bot – A New Malware Downloader Spotted
Security experts from Malwarebytes discovered a new malware strain used in phishing attacks to install credential stealers and additional malware payloads. Tracked as Saint...
Malvertising Mayhem: Here’s Everything You Need to Know
Cybercriminals often create innovative malware variants and malicious campaigns to steal users’ identities or private information. In most malware-related attacks, threat actors deploy malware...
FBI Removes Malicious Web Shells from Microsoft Exchange Servers
The FBI executed a court-authorized operation to copy and delete malicious web shells from hundreds of vulnerable systems in the U.S. that were running...