Category Archives Zero Day Attacks

Recently a Dark Web vendor Double Flag was reported selling more than 1 Billion accounts stolen from Chinese Internet companies. As per the reports, the data compromised belongs to companies such as NetEase Inc and its subsidiaries like 126.com and Yeah.net. In the last few months, DoubleFlag uploaded databases for sale which included Brazzers, Epic Games, ClixSense, uTorrent Forum, Mail.ru,…

As per the reports of the local German media, Different hacking groups conduct on an average of 20 cyber-attacks against the Germany's government networks every day. With their attacks getting more consolidated and sophisticated by the time, hackers are aiming at weakening the system, steal information and cause damage by breaching into the computer systems of the German institutions and…

On the grounds of the latest findings by the cyber security firm FireEye claimed that South Korean entities had been compromised online. These entities, as the investigation suggests, have been targeted by a group of hackers backed by Chinese state. The events comes in the lights of the Chinese government constantly raising concerns against the deployment of the Terminal High-Altitude…

Phishing is a form of cyber-attack in which an individual receives an email which appears to be from a trusted source. This deceptive mail can be dangerous in multiple ways as they can ask for money or take the individual to an equal deceptive website that can cause him to install malware onto his computer or fill in sensitive information.…

Just in the span of four months, the Holland based analytics app ‘Twitter Counter’ has once again acted as a gateway for hackers to upload pro-turkey messages from some highly prominent twitter handles belonging to celebrities, Forbes, UNICEF, Nike Spain, Amnesty International and several numerous other individuals and organizations. All these events follow the recent incident where Dutch officials prohibited…

Some time back, the phishing attack that had the Gmail users bewildered was tried upon the Paypal users as well. Paypal, with its strong user base and growing popularity, makes it a perfect target for the cybercriminals. Before going ahead with the phishing attack on Paypal users, let’s understand what a phishing attack is. In a phishing attack, fake emails…

If you believe conspiracy theorists, a world government is about to be formed spawned by the demonetization of hard currency enabling a cash less society that can be controlled by a flick of a button. To most people money equals to currency in their hand. With the recent demonetization in India of higher denomination currency notes, the problems that average…

Hackers posted online on the dark web of having discovered vulnerabilities in the servers of Tesco Bank many months before the Bank was actually robbed of £2.5m by hackers. Cyberint the company that does cyber security research claims to have come across posting in dark web forums by hackers of claiming that the bank is a "cash milking cow" and "easy…

Zero Day means precisely that. There is no previous history of a vulnerability or the malware. There is a commercial market for manufacturing Zero Day exploits that hook on to previously unknown vulnerabilities. And according to the FBI, this was how they could break into  a terrorists iPhone when Apple refused to help. Both hackers, black and white ones are…

Close