03 Feb 2020

Hackers are hijacking smart building access systems to launch DDoS attacks

Hackers have been searching the internet to hijack smart door and building access control systems. After compromising these systems, they launch DDoS attacks. The firewall company SonicWall reported the outbreak of this type of attack over the weekend, stating that they are targeting primarily Linear eMerge E3, which is produced

Read More
31 Jan 2020

NEC Defense Contracts Info Potentially Compromised in Breach

NEC, a Japanese electronics giant, was the victim of a cyberattack resulting in unauthorized access to its internal network. The attack occurred on Thursday, and the company has since released an official statement regarding the hack. NEC is a major contractor for the Japanese defense industry and has engaged in

Read More
31 Jan 2020

Iranian hackers target US government workers in new campaign

Government-backed Iranian hackers have recently been targeting US federal workers, aiming to compromise government systems by attacking servers with malware. The hacking attempts have been traced back to a threat actor group named APT34, which first began launching attacks against the US six years ago on the behalf of the

Read More
29 Jan 2020

Zoom Fixes Flaw Opening Meetings to Hackers

This week, enterprise video conferencing firm Zoom has patched a flaw that previously allowed attackers to guess a meeting ID and enter a private meeting held between two entities using Zoom services. The company has experienced a series of security issues and subsequent patches after researchers stated that the company’s

Read More
28 Jan 2020

Intel Is Patching the Patch for the Patch for Its ‘Zombieload’ Flaw

Over the past few years, security researchers have found hundreds of vulnerabilities that allow a hacker to trick Intel’s microprocessors into unauthorized data access. As the flaws have been exposed, employees have rushed to release patches for them. However, Intel has failed to patch the underlying problem behind a serious

Read More
28 Jan 2020

Average Cost To Recover From Ransomware Skyrockets To Over $84,000

A new report from Coveware claims that the average cost to recover from ransomware now stands at just over $84,000, over double the previous figure of $41,000. Coveware’s report stated that the sharp increase isn’t just a result of cybercriminals demanding higher ransoms, but that hardware replacement and repair costs,

Read More
28 Jan 2020

FBI Releases Alert on Iranian Hackers’ Defacement Techniques

A flash security alert was issued by the FBI’s Cyber Division earlier this month, including an indication of compromise from recent defacement attacks perpetrated by Iranian threat actors. The Cybersecurity and Information Security Agency (CISA) also published an alert on the same day to provide information on safeguarding websites from

Read More
27 Jan 2020

Saudi Prince Courted Amazon’s Bezos Before Bitter Split

Throughout 2018, Jeff Bezos, Amazon Inc. founder, and Saudi Crown Prince Mohammed bin Salman engaged in friendly conversation through the popular messaging app WhatsApp. The pair planned for Amazon to build a huge data center in Saudi Arabia, forging a cordial and mutually beneficial relationship. The Wall Street Journal reviewed

Read More
23 Jan 2020

Thousands of WordPress Sites Hacked to Fuel Scam Campaign

Over 2,000 WordPress sites have been hacked according to website security firm Sucuri. Sucuri analysts detected attackers exploiting vulnerabilities in plugins used by many WordPress customers to add additional features to their operations. The analysts detected the vulnerabilities in the third week of January. The hacks were purported to fuel

Read More
23 Jan 2020

Email malware targets U.S. senator and military

Emotet, a powerful email malware, is being used to attack US government targets. Cybersecurity researchers reported that they are witnessing a resurgence in the malware’s popularity, particularly towards government entities. The malware attacks are spread through email and are able to infiltrate other contacts within the inbox. According to research,

Read More