Central Asia

Central Asia
http status code attack rat remote access trojan

Remote access trojan attacks using remote control via HTTP status codes

May 20, 2020

Here is a brief background about a malware called COMpfun….

covid-19 covid19 themed phishing scheme attack antiphishing antiphishing solutions

Information-stealing trojan now disseminate via COVID-19 phishing email

May 19, 2020

As we are all still suffering COVID-19 lockdown, Cybercriminals will…

godaddy security breach compromised data data leak

Godaddy breach: Millions of customer data are at risk!

May 18, 2020

Who uses GoDaddy? – Why you should be concerned There…

digital ocean data leak incident compromised data

DigitalOcean leaks: How severe was the exposure?

May 17, 2020

One of the biggest web hosting platforms, DigitalOcean, has reportedly…

lock bit ransomware

Lock Bit Ransomware: Too quick to spread on 225 systems

May 15, 2020

Too Quick But True Lock bit Ransomware, since its release…

wordpress code injection vulnerabilities software vulnerability

Another WordPress Site Blunder: Vulnerabilities are likely to target 900,000 sites per week

May 13, 2020

Are you setting up a WordPress site for business? If…

perswaysion hacking attack

Perswaysion hacking attack – Executives of globally reputed companies are on target

May 12, 2020

Since last year, a growing number of reports targeting high…

zoom zero day vulnerability hacking darkweb data privacy security threat

After Zoom bombing: More vulnerabilities and hacking attempts on Zoom

April 21, 2020

What is new with Zoom?  After the Zoom bombing incident…

zoom bombing

Zoom Bombing

April 12, 2020

Zoom Bombing: The Zoom attack that work from home people…

Messaging Applications: threat that all businesses need to consider

Messaging Applications: A new threat landscape that all businesses need to consider

April 9, 2020

In response to the COVID19 virus, governments around the world…