01 Jun 2022

Anonymous Claims Attacks Against Belarus for Involvement in Russian Invasion of Ukraine

Spid3r, an organization affiliated with Anonymous, claims to have launched attacks against the government of Belarus in retaliation for the country’s perceived support of Russia’s invasion of Ukraine and subsequent ongoing military conflict. The group announced its moves on Twitter, stating that it was targeting government websites associated with the

Read More
01 Jun 2022

EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

Cybersecurity researchers have released new warnings about the EnemyBot malware, which reportedly borrows code from botnets such as Mirai, Qbot, and Zbot. The rapidly evolving tool functions as IoT malware and targets content management systems (CMS) web servers and Android devices. Security researchers believe that the bot might be the

Read More
01 Jun 2022

Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

Microsoft has released a workaround for a critical zero-day flaw that is reportedly being actively exploited by threat actors. Dubbed ‘Follina,’ the vulnerability was originally identified in April and has been leveraged by attackers to target organizations in Russia and Tibet. The flaw is tracked as CVE-2022-3019 and is a

Read More
31 May 2022

US Academic Credentials Displayed in Public and Dark Web Forums

The Federal Bureau of Investigation (FBI) has warned the public of a new threat via a Private Industry Notification. The warning targets universities, colleges, and higher education institutions that credentials have been advertised for same on dark web criminal marketplaces. According to the FBI, the credentials were discovered in January

Read More
31 May 2022

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

Security researchers have warned that the ChromeLoader browser hijacker could provide a gateway into bigger threats, such as the capability to spread ransomware, spyware, and steal data from browser sessions. Researchers state that the malware’s use of PowerShell could further this malicious activity, transforming it from a run-of-the-mill browser hijacker

Read More
27 May 2022

Making the Metaverse Safe For Everyone

Unlike any other time in history, the past decade has shown us the power of technology to transform our working and personal lives. Technology-enabled shopping, banking and working from any location made the restrictions from COVID-19 more manageable. We are also getting a hint of the power that big data,

Read More
27 May 2022

India’s SpiceJet Strands Planes After Being Hit By Ransomware Attack

SpiceJet, an India-based airline, was forced to delay numerous flights on Wednesday after being hit by a ransomware attack that occurred on Tuesday. The company released a post to Twitter confirming that its operations had been impacted by the cybersecurity incident. On Thursday, morning flight departures were still suffering from

Read More
27 May 2022

Cybergang Claims REvil is Back, Executes DDoS Attacks

According to researchers at Akamai, actors claiming to be the REvil ransomware group is targeting one of its customers with a Layer 7 attack. The group has also demanded an extortion payment in Bitcoin from Akami’s client. The defunct REvil ransomware gang went dark in July 2021 after several law

Read More
27 May 2022

Critical Flaws in Popular ICS Platform Can Trigger RCE

Cisco Talos has reportedly uncovered eight vulnerabilities in the Open Automation Software, a popular industrial control system (ICS) platform. Two of the flaws are categorized as critical, meaning that they pose a risk for infrastructure networks and should be addressed immediately. Exploiting the flaws could lead to remote code execution

Read More
27 May 2022

Ed tech wrongfully tracked school children during pandemic says Human Rights Watch

According to Human Rights Watch (HRW), students who were required to use government-endorsed education technology, also referred to as ed tech, during the Covid-19 pandemic may have been subject to a variety of harmful cyber practices, such as keystroke monitoring and data collection. In addition, the HRW alleges that the

Read More