Hackers have alleged that the Chief Information Security Officer (CISO) of Star Health Insurance, Amarjeet Khanuja, sold them sensitive data of over 31 million customers. The data, including names, birth
Uncategorized
Hackers Using Phone Calls to Attack Employee System With Malware
Recently, there has been a rise in hackers using callback phishing. One common form of this attack, known as telephone-oriented attack delivery (TOAD), starts with a phishing email that seems
What is Boot Sector Virus? Types, Symptoms & Preventions
A Boot Sector Virus is a type of malware that targets the boot sector of a computer’s hard drive or any other storage device, such as a USB flash drive.
Microsoft Security Updates: 5 Zero-Days & 118 Vulnerabilities Patched
In its latest Patch Tuesday release, Microsoft addressed 118 vulnerabilities, including five zero-day flaws, two of which attackers are actively exploiting. The updates cover various Microsoft products, including Windows, Office, Azure, .NET, and Visual Studio.
Healthcare’s Grim Cyber Prognosis Requires Security Booster
North Korean APT Hackers Exploiting DMARC Misconfigs For Phishing Attacks
DMARC is an email authentication protocol that helps domain owners protect against unauthorized use like “email spoofing” and “phishing attacks.” By leveraging existing protocols like “SPF” and “DKIM,” DMARC enables
LemonDuck Malware Exploiting SMB Vulnerabilities To Attack Windows Servers
LemonDuck malware has evolved from a cryptocurrency mining botnet into a “versatile malware” that is capable of “stealing credentials,” “disabling security measures,” and “propagating through various methods.” It targets both
Comcast Data Breach: 237,000+ Customers’ Personal Data Exposed
A data breach has impacted more than 237,000 Comcast customers, exposing their personal information such as names, addresses, Social Security numbers, dates of birth, and Comcast account numbers. The breach
CISO Paychecks: Worth the Growing Security Headaches?
Critical Oath-Toolkit Vulnerability Let Attackers Escalate Privilege
OATH Toolkit is a software suite that is primarily designed to implement OTP authentication systems. It includes libraries and command-line tools for generating both event-based (HOTP) and time-based (TOTP) OTPs.