Have Any Questions?
Call Now +353 1-211-8666
Blog

Category

With attacks predicted to increase exponentially throughout 2022, maybe we should all think before scanning the next QR code we encounter.Despite eliminating the need to type a URL on your smartphone and explore new innovative ways of engagement, marketers were forced to admit defeat and retire their obsession with quick-response (QR) codes. But a decade...
Cybercriminals have learned how to use copyright infringement notices as bait in phishing scams. This time, Sophos observed threat actors targeting Instagram users.Have you ever posted a photo on Instagram that wasn’t yours, maybe to get a bit more followers? If so, a message like this one below might scare you into taking action.“We recently...
T-Mobile suffered from a data breach in a series of SIM swapping attacks, potentially leaving sensitive information of a small number of customers exposed. The incident comes just a few months after a massive breach affected 53 million customers back in August.According to the T-MO report, unauthorized activity on some of the customers’ accounts may...
Security teams at companies large and small are scrambling to patch a previously unknown vulnerability called Log4Shell, which has the potential to let hackers compromise millions of devices across the internet.If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines.The vulnerability...
The change is likely a result of the fallout from Israeli company NSO Group allowing authoritarian regimes to use its Pegasus spyware.The Israeli Ministry of Defense reduced the number of countries that Israeli companies can export cyber tools to from 102 to 37, Calcalist, a local business paper, reports.The updated list of countries Israeli companies...
British journalists have located Yevgeniy Polyanin, a 28-year-old hacker wanted by the FBI for deploying the REvil/Sodinokibi ransomware.The hacker was found to be living in a $380,000 house in Barnaul, a Russian city housing 610,000 residents in the Altai region, dailymail.com reports.Journalists photographed the hacker driving his $74,000 Toyota Land Cruiser 200. A BMW worth...
Evidence suggests that IKEA’s on-premises Microsoft Exchange servers may have been compromised by threat actors.Furniture giant IKEA confirmed that it was hit by a wave of email reply-chain cyberattacks that targeted the company’s internal mailboxes, as well as those of IKEA’s suppliers and business partners, BleepingComputer reports.Attackers carry out reply-chain attacks by gaining access to...
As the year is coming to a close, it’s time to take a look at the evolution of the ransomware landscape in 2022. Security experts believe that the level of sophistication and scale of cyberattacks will continue to increase, causing record-breaking financial losses.Ransomware will become more aggressive and widespread, while threat actors behind major ransomware...
Web registrar and hosting company GoDaddy submitted a filing to the Securities and Exchange Commission (SEC) on Monday, revealing that email addresses of up to 1.2 million Managed WordPress customers of the company had been accessed by an unauthorized third party.GoDaddy said the breach, perpetrated by the attackers via a compromised password, was initially discovered...
Security researchers found dozens of games on Huawei’s AppGallery store infected with the Android.Cynos.7.origin trojan, which is designed to collect users’ device data and phone numbers. At least 9,300,000 users have downloaded and installed these malicious games on their Android devices.The infections were discovered by a team of malware analysts at antivirus firm Doctor Web,...
1 2 3 4 6