Cyber Attacks

How to Keep Your Business Protected From Cyber Attack

On May 6, 2019, the city of Washington, Pennsylvania, suffered a malware attack that shut down its phone and messaging system for more than a week. The only exception is the 911 system, which operates throughout the county and continues to be available to residents of the city. This type of ransomware attack can occur

[ Read More ]

UAE’s Phishing And Social Engineering Problems

Global cloud-based email management firm Mimecast, in their State of Email Security report, revealed that their study revealed that UAE’s cyber impersonation cases are up by 75%, which caused financial loss for the victims. The report is a result of the aggregate information coming from more than a thousand IT leaders from multinational companies, with

[ Read More ]

Oracle WebLogic Servers Hit With Zero-Day Attack

Oracle WebLogic Servers are not the usual targets when it comes to cyber attacks. Besides, the service is a niche and is facing strong competition from the likes of Amazon with their AWS and Google with its fleet of web services. This time, a new ransomware variant named Sodinokibi has penetrated WebLogic Servers using a

[ Read More ]

Beapy Cryptojacking Malware: The Return Of Eternal Blue Exploit

The Eternal Blue exploit, the infamous Windows bug that the U.S. National Security Agency weaponized and was eventually leaked by the Shadow Brokers hacking group, which was then later used for the successful WannaCry ransomware campaign in 2017 is re-emerging. WannaCry launched ransomware into public prominence and even made an estimated $4 billion profit for

[ Read More ]

Espionage Malware Karkoff Campaign Revealed

Cisco Talos has revealed in a report that the new campaign initiated by a group of hackers responsible for DNSpionage earlier that uses malware to infiltrate target firms. The malware has the capability to use both regular http and dns-based communication to its command and control servers, moving data stolen from computers to the custody

[ Read More ]

Cyberattacks Against IoT Devices on the Rise

Cyber attacks targeting IoT (Internet-of-Things) devices are rapidly increasing, as more people and organizations deploy them. IoT devices that are connected to the Internet but do not have a password set, or are often operated with the initial settings, are likely candidates to be targeted next. Various incidents have already occurred, some of which were

[ Read More ]

Beijing Internal Network Also A Victim Of Ransomware

Beijing is the favorite whipping boy of the Western powers when it comes to being accused of abusing its citizens, causing harm for the rest of the world through its espionage campaigns and maintaining its own army of blackhat elite hackers. However, the reality is China is as vulnerable a country to typical cyber attacks

[ Read More ]

Lack Of Policy Of Least Privilege Causes Cyber Attacks

The computer policy of the least privilege is not only an important principle but rather a critical piece of IT security precaution these days. Any organization should practice it, in order to lessen the possibility of unauthorized access or stolen account causing trouble for a system, especially in cloud-based apps and critical IT infrastructures. This

[ Read More ]

Swiss Government Wants its E-Voting System to be ‘Hacked’

Want to earn quick cash? Then accept the invite of the Swiss government, as they are offering $30,000 reward whoever can hack their e-voting system. The pen test challenge are both open for companies, groups and individuals, with the successful party earning $30,000 in cold cash. “The e-voting system is the first Swiss system that

[ Read More ]

Attempted Cyber Attack on Australian Parliament

Australia’s security agencies are investigating a likely cyber-attack attempt on the Federal Parliament’s computer system. It is alleged that the government believes that some foreign government is behind the attack. The hackers were caught in the early stages of gaining access to the system because the authorities didn’t find any loss of data, but signs

[ Read More ]