Online Security
1 min read
52

Google Cloud Certifications — Get Prep Courses and Practice Tests at 95% Discount

March 5, 2021
0

As cloud computing continues to grow, Google Cloud is quickly becoming one of the most popular solutions. However, relatively few engineers know this platform well. This leaves the door open for aspiring IT professionals who take the official exams. The Google Cloud Certifications Practice Tests + Courses Bundle helps you

Continue Reading
Online Security
1 min read
42

Google Will Use ‘FLoC’ for Ad Targeting Once 3rd-Party Cookies Are Dead

March 4, 2021
0

Signaling a major shift to its ads-driven business model, Google on Wednesday unequivocally stated it would not build alternate identifiers or tools to track users across multiple websites once it begins phasing out third-party tracking cookies from its Chrome browser by early 2022. “Instead, our web products will be powered

Continue Reading
Online Security
1 min read
35

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

March 3, 2021
0

Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted on infected websites, once again highlighting how threat actors quickly change tactics when their attack methods are discovered and exposed publicly. New research released by Cisco Talos reveals a new malware campaign targeting organizations

Continue Reading
Online Security
1 min read
44

Researchers Unearth Links Between SunCrypt and QNAPCrypt Ransomware

March 2, 2021
0

SunCrypt, a ransomware strain that went on to infect several targets last year, may be an updated version of the QNAPCrypt ransomware, which targeted Linux-based file storage systems, according to new research. “While the two ransomware [families] are operated by distinct different threat actors on the dark web, there are

Continue Reading
Online Security
1 min read
46

Gootkit RAT Using SEO to Distribute Malware Through Compromised Sites

March 1, 2021
0

A framework notorious for delivering a banking Trojan has received a facelift to deploy a wider range of malware, including ransomware payloads. “The Gootkit malware family has been around more than half a decade – a mature Trojan with functionality centered around banking credential theft,” Sophos researchers Gabor Szappanos and

Continue Reading
Online Security
1 min read
42

Online Trackers Increasingly Switching to Invasive CNAME Cloaking Technique

February 28, 2021
0

With browser makers steadily clamping down on third-party tracking, advertising technology companies are increasingly embracing a DNS technique to evade such defenses, thereby posing a threat to web security and privacy. Called CNAME Cloaking, the practice of blurring the distinction between first-party and third-party cookies not only results in leaking

Continue Reading
Online Security
1 min read
45

Malicious Amazon Alexa Skills Can Easily Bypass Vetting Process

February 27, 2021
0

Researchers have uncovered gaps in Amazon’s skill vetting process for the Alexa voice assistant ecosystem that could allow a malicious actor to publish a deceptive skill under any arbitrary developer name and even make backend code changes after approval to trick users into giving up sensitive information. The findings were

Continue Reading
Online Security
1 min read
46

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

February 26, 2021
0

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign aimed at exfiltrating sensitive information from organizations in the defense industry. Attributing the attacks with high confidence to the Lazarus Group, the new findings from Kaspersky signal an expansion of the APT actor’s tactics

Continue Reading
Online Security
1 min read
40

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

February 25, 2021
0

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by deploying a malicious Firefox extension on target systems. “Threat actors aligned with the Chinese Communist Party’s state interests delivered a customized malicious Mozilla Firefox browser extension that facilitated access and control of users’ Gmail

Continue Reading
Online Security
1 min read
42

Everything You Need to Know About Evolving Threat of Ransomware

February 24, 2021
0

The cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal—most destructive, persistent, notoriously challenging to prevent, and is showing no signs of slowing down. Falling victim to a ransomware attack can cause significant data loss, data breach, operational downtime,

Continue Reading
Online Security
1 min read
43

Experts Find a Way to Learn What You’re Typing During Video Calls

February 23, 2021
0

A new attack framework aims to infer keystrokes typed by a target user at the opposite end of a video conference call by simply leveraging the video feed to correlate observable body movements to the text being typed. The research was undertaken by Mohd Sabra, and Murtuza Jadliwala from the

Continue Reading
Online Security
1 min read
47

How to Fight Business Email Compromise (BEC) with Email Authentication?

February 22, 2021
0

An ever-evolving and rampant form of cybercrime that targets emails as the potential medium to conduct fraud is known as Business Email Compromise. Targeting commercial, government as well as non-profit organizations, BEC can lead to huge amounts of data loss, security breach, and compromised financial assets. It is a common

Continue Reading
Online Security
2 min read
53

Privacy Bug in Brave Browser Exposes Dark-Web Browsing History of Its Users

February 21, 2021
0

Brave has fixed a privacy issue in its browser that sent queries for .onion domains to public internet DNS resolvers rather than routing them through Tor nodes, thus exposing users’ visits to dark web websites. The bug was addressed in a hotfix release (V1.20.108) made available yesterday. Brave ships with

Continue Reading
Online Security
1 min read
47

New Hack Lets Attackers Bypass MasterCard PIN by Using Them As Visa Card

February 20, 2021
0

Cybersecurity researchers have disclosed a novel attack that could allow criminals to trick a point of sale terminal into transacting with a victim’s Mastercard contactless card while believing it to be a Visa card. The research, published by a group of academics from the ETH Zurich, builds on a study

Continue Reading
Online Security
1 min read
38

Masslogger Trojan Upgraded to Steal All Your Outlook, Chrome Credentials

February 19, 2021
0

A credential stealer infamous for targeting Windows systems has resurfaced in a new phishing campaign that aims to steal credentials from Microsoft Outlook, Google Chrome, and instant messenger apps. Primarily directed against users in Turkey, Latvia, and Italy starting mid-January, the attacks involve the use of MassLogger — a .NET-based

Continue Reading
Online Security
1 min read
38

First Malware Designed for Apple M1 Chip Discovered in the Wild

February 18, 2021
0

One of the first malware samples tailored to run natively on Apple’s M1 chips has been discovered, suggesting a new development that indicates that bad actors have begun adapting malicious software to target the company’s latest generation of Macs powered by its own processors. While the transition to Apple silicon

Continue Reading
Online Security
1 min read
50

Agora SDK Bug Left Several Video Calling Apps Vulnerable to Snooping

February 17, 2021
0

A severe security vulnerability in a popular video calling software development kit (SDK) could have allowed an attacker to spy on ongoing private video and audio calls. That’s according to new research published by the McAfee Advanced Threat Research (ATR) team today, which found the aforementioned flaw in Agora.io’s SDK

Continue Reading
Online Security
1 min read
43

Managed Service Provider? Watch This Video to Learn about Autonomous XDR

February 16, 2021
0

As managed security service providers, you’re always on the lookout for new platforms. One that can generate further business, enables you to scale easily without investing in more human resources and provides that value immediately. In the meanwhile, your clients are constantly demanding more security for a lesser cost. Cynet

Continue Reading