Spain arrest threat actors for SIM Swapping Attack
The Policia Nacional has arrested eight individuals last week after dismantling an anonymous cybercriminals organization for several SIM swapping attacks and financial fraud.
The Policia Nacional has arrested eight individuals last week after dismantling an anonymous cybercriminals organization for several SIM swapping attacks and financial fraud.
The San Francisco 49ers NFL team fell victim to BlackByte ransomware attack and has its corporate files encrypted. The operators have also stolen the data as per the double extortion attack vector and published sample on their data leak site.
On February 10th, the French national data protection authority issued a formal announcement to website managers that use of Google Analytics is a violation of GDPR and can be penalized for the same.
According to new research ThreatFabric, two new Android banking Trojans named FluBot and Medusa are relying on the same delivery vehicle as part of simultaneous attack campaign.
A new type of ransomware is found targeting individual user devices and not corporate networks, which is also demanding for low ransom.
A hacker group called Moses Staff is incorporating an undocumented Remote Access Trojan (RAT) that disguises as a Windows Calculator App to go stealth.
Multiple security vulnerabilities have been disclosed in 42 Gears SureMDM solution. It is a mobile device management solution that can be manipulated by threat actors to execute supply chain attacks.
A new fingerprinting technique is exploiting a device’s graphics processing unit (GPU) that can track users activity on the web persistently. This technique is called as DrawnApart, and identifies as a device from the unique properties of the the GPU.
A German Court from Munich has ordered a website owner to pay a penalty of €100 for migrating personal data of users. The owner has leveraged the IP address of the users via Google Fonts library without the user’s consent.
A framework that is used for developing, implementing, monitoring, and improving IT governance is called as COBIT (Control Objectives for Information and Related Technology)
Our vision is to deliver the trending and happening cyber events to the enthusiasts.
We believe in delivering educational and quality content for hassle-free understanding of the subject.
You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.