South Asia

South Asia
WeLeak Database Threat Group Data Leak Stolen Databases iZOOlogic Dark Web Fraud Prevention

The WeLeak Database group continues to leak stolen databases

June 23, 2022

Threat groups leaking stolen databases have been widespread across the…

Citrix ADM Vulnerability Flaw Hackers Reset Admin Data Patch

A Citrix ADM flaw that lets hackers reset admin data gets patched

June 22, 2022

A critical vulnerability tracked CVE-2022-27511 that affected the Citrix Application…

Sophos Firewall Vulnerability Exploit Chinese Hackers Zero Day Flaw

Sophos firewall exploited by Chinese hackers using a zero-day flaw

June 21, 2022

A malicious group of threat actors from China exploited a…

Cybersecurity Researchers Infiltrate Microsoft Cloud Applications OneDrive Sharepoint Bug

Researchers found a loophole to infiltrate Microsoft’s cloud applications

June 21, 2022

Microsoft’s SharePoint and OneDrive have been identified with a flaw…

PureCrypter Malware Cyberattacks Attack Vector Telegram

PureCrypter adds new modules for better cyberattacks

June 17, 2022

A notorious multi-functional loader called PureCrypter has been updated by…

Dragon Force Hacktivist Threat Group India IT Infrastructure Hostnet

Dragon Force hacktivist group targets India’s IT infrastructure

June 16, 2022

A Malaysian hacktivist group called Dragon Force gathers other hackers’…

Zimbra Email Vulnerability Flaw Abuse Hackers Data Stealing Exfiltration

A Zimbra email flaw gets abused by hackers to steal corporate data

June 16, 2022

Zimbra, an email software suite, is found with a new…

MyEasyDocs Exposed Data India Israel Students Microsoft Azure Misconfiguration

MyEasyDocs accidentally exposed data of Indian and Israeli students

June 13, 2022

An Indian-based online documents verification platform called MyEasyDocs has exposed…

BEC Cyberattacks Business Email Compromise Language Attack Vector

A surge in BEC attacks using language as a vector was detected

June 10, 2022

Analysts released an email security advisory that shows how language-based…

Reverse Tunnels URL Shorteners Phishing Campaigns Ngrok Argo LocalhostRun DNS

Reverse tunnels and URL shorteners leveraged for phishing campaigns

June 7, 2022

A surge of use in reverse tunnels and URL shorteners…