Email:

Phone No.

Whatsapp

Blog

Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall
Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall
Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall
Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall

Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall

Credit Card Stealing Malware Bundles Backdoor For Easy Reinstall An almost impossible to remove malware set to automatically activate on Black Friday was deployed on multiple Magento-powered online stores by threat actors according to researchers at Dutch cyber-security company Sansec. Threat actors behind these web skimming attacks (also known as Magecart) targeted and infiltrated online stores

Scammers Spoof Target’s Gift Card Balance Checking Page

Scammers Spoof Target’s Gift Card Balance Checking Page It’s the giving season, and cybercriminals are more actively looking to steal gift cards. One of the most popular brands in their sight is giant retailer Target. A trick that crooks are currently pulling is to lure victims to fake sites that check the balance on the

All Kubernetes Versions Affected By Unpatched MiTM Vulnerability

All Kubernetes Versions Affected By Unpatched MiTM Vulnerability The Kubernetes Product Security Committee has provided advice on how to temporarily block attackers from exploiting a vulnerability that could enable them to intercept traffic from other pods in multi-tenant Kubernetes clusters in man-in-the-middle (MiTM) attacks. Kubernetes (aka K8s), originally developed by Google and now maintained by the Cloud Native Computing Foundation,

D-Link VPN Routers Get Patch For Remote Command Injection Bugs

D-Link VPN Routers Get Patch For Remote Command Injection Bugs A vulnerability in D-link firmware powering multiple routers with VPN passthrough functionality allows attackers to take full control of the device. The bug affects router models DSR-150, DSR-250/N, DSR-500, and DSR-1000AC running firmware version 3.17 or below. Run commands with root privileges Reported by Digital Defense’s

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us