Posts From Mo Moin

The cybercrime group behind Satan ransomware and other malware seems to be involved in the development of a new threat named 5ss5c. The threat actors behind the Satan, DBGer and Lucky ransomware and likely Iron ransomware, is back with a

Did you realize that a hack occurs every 39 seconds? One of the most common targets for cyber-criminals attempting to gain access to sensitive information is a business website. The only way to keep your website functional and safe is

Fleeceware apps continue to be a problem on Google Play, these app publishers overcharge users for basic functionality if they don’t cancel the subscription before the trial ends. The app publishers take advantage of the business model in which user

Thousands of UK business professionals have had their personal details exposed online via a leaky Amazon Web Services bucket, after researchers discovered files belonging to multiple consulting firms. The misconfigured S3 resource is thought to have been left publicly viewable

Several mobile apps such as Grindr, OKCupid and Tinder have been found to be leaking personal information to advertising tech companies in possible violation of European data privacy laws, an investigation by a Norwegian consumer group has discovered. As stated

An infamous Kremlin-backed hacking group has launched a coordinated phishing campaign aimed at Ukrainian firm Burisma Holdings, in what looks like an attempt to find internal information which could benefit Donald Trump. Security vendor Area 1 claimed the attacks were

Microsoft has kicked off the new decade with fixes for half a century of vulnerabilities, including one discovered by the NSA that could allow hackers to spoof digital certificates to bypass security measures. This month’s Patch Tuesday focused around the

An app designed to record and share milestones in a child’s development has leaked thousands of images and videos of babies online. Bithouse Inc., the developer of the Peekaboo Moments app, failed to secure a 100 GB Elasticsearch database containing

Four months after fleeceware’s initial exposure, Android users who purchase “subscriptions” to apps from the Google Play Store are still at risk of being ripped off. Fleeceware hit the news in September 2019, when researchers at SophosLabs showed how some

Researchers discovered a new type of strange malware that targeting android device, and use the victim’s mobiles to provide fake ratings in Google play store apps for malicious apps. You may have seen reviews in Google Play apps that seem

CISA has released a new tool for administrators and users to check for Citrix Application Delivery Controller (ADC) and Citrix Gateway vulnerability. The vulnerability can be tracked as CVE-2019-19781, it allows an unauthenticated remote attacker to execute arbitrary code on

A Texas school district has found out the hard way that phishing attacks remain a serious financial threat to organizations of all shapes and sizes, losing an estimated $2.3m in a recent scam. Manor Independent School District took to Twitter

A website set-up to accept donations for victims of the devastating Australian bushfires has become a victim itself — of digital skimming code designed to harvest card details. Security researchers at Malwarebytes took to Twitter to reveal the problems that

A threat hunting team can be better enabled when given the time and interest to focus on what it wants. Speaking at the SANS Institute Threat Hunting and IR Europe conference in London, David Bianco, principal engineer, cybersecurity and Cat

The verdant city of Seattle is to host a new three-day event dedicated to cybersecurity and the cloud. CSA SECtember will feature in-depth training sessions, networking opportunities, and the chance to interact with a score of global experts. The event

The United States Transport Security Administration (TSA) has publicly announced that it’s on a “quest to merge cybersecurity and information technology.” Instead of cybersecurity’s being an add-on or afterthought, the TSA wants the industry to adopt a culture of “cybersecurity