News

this line edit with HTML in Ads Management Front Page Before Loop

New SamSam Ransomware Targets US Organisations Nationwide

A new report by cybersecurity firm Symantec has revealed that the hacking group behind the expensive cyberattack that shut down several of the city of Atlanta’s computer systems is targeting other US-based organizations. They include up to 67 new targets, including one involved in the…

Canadian Satellites are Vulnerable to Cyberattacks, Defence Dept Warns

Crucial satellites essential to Canadian military operations are vulnerable to cyberattacks, even a direct missile strike, an internal Defence Department note has warned. c According to a CBC report, a Defence Department within the Canadian military sees critical satellites essential for fundamental tasks including navigation,…

Hackers Steal Data of 75,000 Users in Healthcare.gov Breach

Hackers have infiltrated a government platform used by brokers and insurance agents to help customers gain healthcare plans, stealing the sensitive and personal data of some 75,000 individuals. In a late Friday announcement, the Centers for Medicare and Medicaid Services confirmed that the hacked system…

Lazarus Operation: AppleJeus - Trojanized trading app

What is AppleJeus?  AppleJeus is the name given by Kaspersky’s Security researchers to the operation conducted by Advanced Persistent Threat (APT) group called Lazarus (HIDDEN COBRA).  The operation aimed to trojanize what seemed to be a legitimate all-in-one style cryptocurrency trading program named Celas Trade Pro developed by Celas Limited (https://www.celasllc.com/) to deliver the malware Fallchill, a…

Facebook Believes Hack of 30 Million Accounts Was Spammers’ Work

Social media behemoth Facebook believes that spammers, not state-sponsored hackers, are behind the recent infamous breach that stole the personal details of nearly 30 million Facebook users. The Wall Street Journal is reporting that Facebook privately believes it was spammers looking to monetize illegally through…

Privilege Escalation on Windows - Abusing Tokens

What is Privilege Escalation? Operating Systems that manage a computer’s hardware and its resources are usually designed to be used by multiple users (accounts). Each of which designate access to a certain amount of resources (physical and logical) using the name “privileges.” The privilege escalation process comes from exploiting design flaws, configuration issues, or bugs in the system to…