03 Jun 2022

10 Companies Chosen to Test Next-Generation Cybersecurity Technologies

Ten UK-based cybersecurity companies have been chosen by the government to participate in the latest phase of the Digital Security by Design program. Their participation will consist of experimenting with prototype cybersecurity technology created to strengthen the hardware underlying the computers. The technology was designed by Arm, a semiconductor and

Read More
02 Jun 2022

Scammers Target NFT Discord Channel

A popular Discord bot has been exploited by hackers deploying phishing and scamming attacks. The campaign attempts to persuade users to click on malicious links. Discord is a public chat application that is designed for gamers, but it has gained the attention of crypto owners across the world. Attackers are

Read More
02 Jun 2022

International Authorities Take Down Flubot Malware Network

The information stealing trojan Flubot has been taken down by international authorities. Flubot was known to use SMS messages and contact credentials to spread internationally across Android devices since December 2020. Europol revealed on Wednesday that a collaboration  between law enforcement agencies in 11 different countries was successful in disrupting

Read More
02 Jun 2022

Nearly Three-Quarters of Firms Suffer Downtime from DNS Attacks

According to a new report released by security vendor efficientIP titled the 2022 Global DNS Threat Report, hybrid and cloud migration during the pandemic led to a surge in DNS-related attacks. In addition, application downtime and data theft are two major consequences of this type of attack. The report assesses

Read More
01 Jun 2022

You Need to Update iOS, Chrome, Windows, and Zoom ASAP

Security researchers at WIRED have urged users to update iOS, Chrome, Windows, and Zoom as soon as possible to stay up to date with relevant security issues. According to Wired, Google has had a busy month releasing patches for the Chrome browser and the Android operating system. In addition, Zoom

Read More
01 Jun 2022

Anonymous Claims Attacks Against Belarus for Involvement in Russian Invasion of Ukraine

Spid3r, an organization affiliated with Anonymous, claims to have launched attacks against the government of Belarus in retaliation for the country’s perceived support of Russia’s invasion of Ukraine and subsequent ongoing military conflict. The group announced its moves on Twitter, stating that it was targeting government websites associated with the

Read More
01 Jun 2022

EnemyBot Malware Targets Web Servers, CMS Tools and Android OS

Cybersecurity researchers have released new warnings about the EnemyBot malware, which reportedly borrows code from botnets such as Mirai, Qbot, and Zbot. The rapidly evolving tool functions as IoT malware and targets content management systems (CMS) web servers and Android devices. Security researchers believe that the bot might be the

Read More
01 Jun 2022

Microsoft Releases Workaround for ‘One-Click’ 0Day Under Active Attack

Microsoft has released a workaround for a critical zero-day flaw that is reportedly being actively exploited by threat actors. Dubbed ‘Follina,’ the vulnerability was originally identified in April and has been leveraged by attackers to target organizations in Russia and Tibet. The flaw is tracked as CVE-2022-3019 and is a

Read More
31 May 2022

US Academic Credentials Displayed in Public and Dark Web Forums

The Federal Bureau of Investigation (FBI) has warned the public of a new threat via a Private Industry Notification. The warning targets universities, colleges, and higher education institutions that credentials have been advertised for same on dark web criminal marketplaces. According to the FBI, the credentials were discovered in January

Read More
31 May 2022

ChromeLoader Browser Hijacker Provides Gateway to Bigger Threats

Security researchers have warned that the ChromeLoader browser hijacker could provide a gateway into bigger threats, such as the capability to spread ransomware, spyware, and steal data from browser sessions. Researchers state that the malware’s use of PowerShell could further this malicious activity, transforming it from a run-of-the-mill browser hijacker

Read More