The study conducted by Comparitech judged countries on the basis of malware attacks, cyber-attack preparedness and most up to date cybersecurity-related legislation. India ranked 15th among 60 countries for the worst cybersecurity with over 25% of its phones and 21% of its computers infected with malware. The study conducted by Comparitech judged countries on the basis of malware attacks, cyber-attack preparedness ...
Read More »Cyber Security News
Critical security flaw found in control systems of several hospitals and supermarket chains
Research study exposed a security flaw existing in temperature control systems manufactured by Resource Data Management. Many popular names that incorporate these control systems include Marks & Spencer, Ocado & Way-on. Resource Data Management (RDM), a Scottish firm engaged in providing remote monitoring solutions, was found to have security loopholes in its temperature control systems (TCS). According to security researchers ...
Read More »The tale of the prolific Cobalt threat group’s massive phishing campaigns against financial institutions
The cybercriminal group ‘Cobalt’ has been named after its penetration testing tool ‘Cobalt Strike’. The threat group has targeted several banks and financial institutions across countries such as Armenia, Bulgaria, Belarus, Estonia, Georgia, Kyrgyzstan Moldova, the Netherlands, Poland, Romania, Russia, Spain, Britain, Malaysia, and more. Cobalt group was first spotted in 2016. The cybercriminal group has been named after the ...
Read More »Remote Code Execution Vulnerability: What is it and how to stay protected from it?
Remote Code Execution (RCE) Vulnerability could allow an attacker to gain full control of a victim’s infected machine. An attacker gaining access to a victim’s machine exploiting the RCE vulnerability can execute system commands, write, modify, delete or read files, and can connect to databases. Remote code execution vulnerability allows an attacker to gain access to a victim’s machine and ...
Read More »CYBERSECURITY WORKERS SCRAMBLE TO FIX A POST-SHUTDOWN MESS
TWO WEEKS OUT from the longest government shutdown in United States history—and with the possibility of another still looming—government employees are still scrambling to mitigate impacts on federal cybersecurity defenses. And the stakes are high. Furloughed cybersecurity employees returned to expired software licenses and web encryption certificates, colleagues burned out from working on skeleton crews, and weeks-worth of unanalyzed network activity logs. The ...
Read More »Australia parliament hit by cyber-hack attempt
Authorities in Australia say they are investigating an attempt to hack into its parliament’s computer network. Lawmakers said there was “no evidence” that information had been accessed or stolen, but politicians’ passwords have been reset as a precaution. Local cyber-security experts have suggested the hack likely came from a foreign state. Australian PM Scott Morrison said he didn’t intend to ...
Read More »Longest DDoS attack since 2015 lasts 329 hours
While the number of DDoS attacks have declined, they have become much more sophisticated, according to a Kaspersky Lab report. The last quarter of 2018 saw the longest DDoS attack since 2015, lasting 329 hours—almost 2 weeks—according to a Kaspersky Lab report released on Thursday. But the top three countries with the most DDoS attacks are still the same: China in first place ...
Read More »Cyber-attack’ on Bernard Matthews staff bank details
A suspected cyber-attack “potentially compromised” the bank account details of 200 workers at Bernard Matthews. The Norfolk-based turkey producer said it was alerted by its bank on 22 January, as first reported in the EDP. “We reported the incident to the relevant authorities and put in place extra security measures,” a spokesman said. “We continue to monitor the situation but we ...
Read More »MATRIX RANSOMWARE CHANGES THE RULES AGAIN | HOW MUCH ARE YOU WORTH?
As noted in the SentinelOne-sponsored EMA Security Megatrends 2019 report, the two greatest threats currently facing enterprise are ransomware and ATAs, advanced targeted attacks that have been designed for a specific environment. The last two years have seen an increase in both kinds of threats, as well as their combination: targeted ransomware such as Ryuk, SamSam, and now Matrix. Matrix variants have been observed before, but ...
Read More »Attackers rely on Google Sheets to spread malware through CSV files
The malware appears to be a variant of the infamous NanoCore trojan.CSV files containing the malware payload circumvent Google filters using Google Sheets as a distribution method. A unique malware that uses Google Sheets has been discovered by well-known cyber security researcher Marco Ramili. The malware is found to be an improved version of the NanoCore RAT detected in 2014. ...
Read More »