It is quite difficult to deny the fact that we live in the age of the Internet. According to analytics firm App Annie, a person currently interacts with their mobile…
Tag: Instagram
The Log4j Vulnerability Is Now Used by State-Backed Hackers
The vulnerability, officially tagged as CVE-2021-44228 and called Log4Shell or LogJam, is an unauthenticated RCE vulnerability that allows total system takeover on systems running Log4j 2.0-beta9 through 2.14.1. What Happened? Nation-state hackers…
Comprehensive Phishing Study Shows Who Is More Prone to Fall Victim to Phishing Attacks
Researchers from ETH Zurich conducted a study to investigate who is more prone to fall victim to phishing cyberattacks in a corporate context. The study involved 14,733 participants and was…
State-sponsored Threat Actors Steal Airline Data Using the Slack API
Reports show that a recently found backdoor dubbed ‘Aclip’ that exploits the Slack API for covert communications is being used by an alleged Iranian state-sponsored cybercriminal. The malicious actor began…
Cobalt Strike Is Being Installed by Emotet for Faster Attacks
Emotet belongs to the malware strain known as banking Trojans, and it primarily spreads through malspam. The messages used by Emotet often contain familiar branding, mimicking the email format of well-known…
Espionage Hacking Campaign Is Targeting Telecom Operators
A fresh espionage hacking effort targeting Middle Eastern and Asian telecommunications and IT service companies was recently discovered. The operation has been running for six months, and it may have…