Scammers Target Online Shoppers Via Magecart Attacks
Scammers exploit shopping gateway via magecart attacks to extract credentials from shoppers buying online. In a blog, Malwarebytes Labs highlighted how cybercriminals were targeting the…
Scammers exploit shopping gateway via magecart attacks to extract credentials from shoppers buying online. In a blog, Malwarebytes Labs highlighted how cybercriminals were targeting the…
The Black Basta ransomware gang recently added Germany’s Maklersoftware GmbH to its victim list. Maklersoftware is an independent provider of Application Service Provider (ASP). Details…
It’s sowing season in South America and cybercriminals are already harvesting. A cybercriminal by the alias ‘theredhand’ has offered to sell data leaked from Brazilian…
A cybercriminal by the name ‘theredhand’ claimed to leak data from Brazilian agrotech companies on the breach forum. They have data from over 150 companies…
After graduating from university, Vispi Palsetia worked as an outsourcing agent. As the CIO of Teleperformance, he oversees a portfolio that includes the company’s operations in…
In yet another COVID-19 patient data breach, the database from arogya.karnataka.gov.in, maintained by the state of Karnataka, India, has been leaked. The user claims that…
A cryptocurrency-themed email urging you to take note of a payment that has “timed out” and needs to be resent has been doing rounds in…
The cybersecurity posture of Indian Railways is under scrutiny again, with the latest breach at the e-booking services website RailYatri. Social media and consumer forums…
TikTok’s meteoric rise to fame has made it a cultural phenomenon, with over 500 million active users consuming content on the platform daily. Unfortunately, the…
Atomic Heart Game Leaked. Yep, you read that right. Hype and controversy about the video game, Atomic Heart, continue as the game gets closer to…
Most cyberattacks need a lure or a medium to reach people. Ransomware attacks, fake app or document downloads, money laundering frauds, MFA fatigue attacks, etc.,…
by David Lukić, Cyber Security Consultant and Director of Security at IDStrong AI technology permeates our lives, from the smartwatch on your wrist to automated…