Posts From Mo Moin

Global fraud attacks soared by 63% from the second half of 2018 to the first six months of this year, with fake mobile applications a growing source of malicious activity, according to RSA Security. The firm’s Quarterly Fraud Report for

The traditional risk management factors you are all taught include the staid process of categorizing potential threats and risks, evaluating their likelihood of occurrence, and estimating the damage that would result from them if not mitigated. The costs of the

Researchers observed a new malware campaign using WAV audio files to hide the malware and to avoid detection. Threat actors embedded the malicious code within the WAV audio files. Based on BlackBerry Cylance threat researchers’ analysis, each WAV file contains

Researchers discovered a new track of ATM jackpotting attack through infamous ATM malware called “Cutlet Maker” which is now rapidly growing up around the world. Cutlet Maker malware specially designed to spit the cash from an ATM machine without using

Any business can experience security breaches at the software or network level. It’s common for headlines to report a virus gaining access to a company’s data or hackers from another country acquiring protected secrets. If you want to protect your

The Chinese government orchestrated a sophisticated multi-year cyber-espionage campaign to gain parity with western aerospace firms and help it build the C919 commercial airliner, a new report has alleged. The story is an exemplar of the lengths Beijing is prepared

Attackers are exploiting Docker Engine deployments that are exposed to the internet without authentication to deploy and run cryptojacking malware on servers. A new cryptojacking botnet with self-spreading capabilities has infected over 2,000 such Docker deployments so far. “There have

Professionals from the cybersecurity industry have called for clarity regarding the role of Chief Information Security Officers (CISOs). Research from Cyber Security Connect UK (CSCUK), a forum for cybersecurity professionals, has stated that CISOs are being pulled into job requirements

A security vendor has detected over 100 million attacks on IoT endpoints in the first half of 2019 alone, highlighting the continued threat to unsecured connected devices. Russian AV vendor Kaspersky said its honeypots had spotted 105 million attacks coming

For more than two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of

Ransomware remains the dominant threat for business now, and will continue to be in the future. Speaking at the NTT Security Information Security World 2019 conference in London, Nicole van der Meulen, head of strategy and development at Europol’s European

One of the web’s largest marketplaces for stolen card data has been hacked, leading to the theft the second time over of more than 26 million cards. A source shared the news with security researcher Brian Krebs, whose name and

Adobe released security updates that cover 82 vulnerabilities in various products, out of 82 vulnerabilities 45 are rated critical and the rest of the vulnerabilities rated as important and moderate. The security fix covers multiple Adobe products that include Adobe

Chinese-speaking cybercrime gang Rocke, that carried out several large-scale cryptomining campaigns in past, has now using news tactics to evade detection. The group has been observed using new tactics, techniques, and procedures (TTPs), it is also using updated malware to

What a time to be alive. We have tons of information at the tips of our fingers, we can get in touch with that distant cousin from the other corner of the world through a single tap, we don’t have

Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set of artifacts to inject a sophisticated backdoor in windows computers. Winnti group activities are being monitored since 2013, since then