cknowledged a breach – this one affecting 3.1 million customers at its subsidiaries while the first was in Australia and believed to be the work of Ocean Lotus, or APT32. The company isn’t yet sure if the hackers nicked any data from its systems but said customers of subsidiaries, including , Lexus Koishikawa Sales, Lexus Nerima, Toyota Tokyo Sales Holdings, ...
Read More »Author Archives: firewallfirmadmin
‘Long-term security risks’ from Huawei
The Chinese company Huawei has been strongly criticised in a report by the body overseeing the security of its products in UK telecoms. The report, issued by the National Cyber Security Centre, which is part of GCHQ, says it can provide “only limited assurance that the long-term security risks can be managed in the Huawei equipment currently deployed in the ...
Read More »New Bill to Protect U.S. Senate Personal Devices, Accounts from Hackers
U.S. senators and their staff will receive assistance from the Senate Sergeant at Arms (SAA) to protect their accounts and devices from cyber threats if a bipartisan bill introduced by Senators and Senate Intelligence Committee members Ron Wyden (D-Ore) and Tom Cotton (R-Ark) will be signed into law. The Senate Cybersecurity Protection Act, S. 890, would allow the SAA — ...
Read More »Researchers publish the list of 583 MAC addresses impacted by recent ASUS hack
The security firm Skylight released the list of 583 MAC addresses out of the total 619 targeted by the attackers. The researchers disassembled Kaspersky’s diagnostic tool to get the full list of addresses. In a recent attack campaign, attackers distributed a backdoored version of ASUS Live Update utility to target ASUS laptop users. It was Kaspersky Lab’s Global Research and ...
Read More »Police make 61 arrests in global crackdown on dark web
Law enforcement agencies from the US, Canada and Europe, including the UK, have joined forces to target suppliers and buyers of illegal goods on dark web marketplaces and warn buyers of risks nternational law enforcement agencies made 61 arrests and shut down 50 dark web accounts used for illegal activity in a joint operation, Europol has announced. As a result of 65 ...
Read More »UC Browser violates Google Play Store policies and raises security concerns by downloading extra modules
UC Browser and UC Browser Mini Android apps violate Google Play Store policies by downloading and installing extra app modules thereby exposing its users to MitM attacks. This updating feature is present in the UC browser application since 2016. What is the issue – UC Browser and UC Browser Mini Android apps violate Google Play Store policies by downloading and ...
Read More »Over 110,000 Australians affected by cyberattack on Facebook last September
The hackers had gained access to a variety of data that includes the users’ movements, hometown, search history, email addresses and phone numbers. The attack occurred due to three flaws in the website. The massive Facebook cyberattack that occurred last year, has affected more than 110,000 Australians. The attack had affected roughly 29 million individuals worldwide. The big picture – ...
Read More »Decryption tool created for ransomware designed to boost PewDiePie subscriptions
A PewDiePie fan has taken his admiration of the popular video game commentator a little too far, creating a ransomware designed to increase the YouTube star’s subscriber count. Fortunately, anti-malware company Emsisoft last week announced a new a decryption tool that restores machines infected by the unusual malware, named “PewCrypt.” On its website, Emsisoft describes PewCrypt as a Java-based ransomware that AES and RSA ...
Read More »Gandcrab ransomware vs. the world
GandCrab is one form of ransomware that has spread rapidly in recent years. Ransomware has become one of the most serious cyberthreats facing organisations today. Regardless of how large or small your business is, hackers are targeting the data living on your computer systems. If you are not properly protected, then your reputation and profitability are at risk. In a ...
Read More »TrickBot Creators Collaborate With BokBot to Conduct Man-in-the-Middle Attacks
Security researchers warned that the cybercriminals behind the two banking Trojans are now collaborating to perform man-in-the-middle (MitM) attacks. On March 17, Crowdstrike discovered a BokBot proxy module called shadDll in conjunction with TrickBot. The code for the two banking Trojans is 81 percent similar, the researchers said, which means the proxy module can be seamlessly integrated into TrickBot’s extensible, modular framework. ...
Read More »