Email:

Phone No.

Whatsapp

Blog

Credit Card Stealer Hides In CSS Files Of Hacked Online Stores
Credit Card Stealer Hides In CSS Files Of Hacked Online Stores
Credit Card Stealer Hides In CSS Files Of Hacked Online Stores
Credit Card Stealer Hides In CSS Files Of Hacked Online Stores

Credit Card Stealer Hides In CSS Files Of Hacked Online Stores

Credit Card Stealer Hides In CSS Files Of Hacked Online Stores Credit card stealer scripts are evolving and become increasingly harder to detect due to novel hiding tactics. The latest example is a web skimmer that uses CSS code to blend within the pages of a compromised store and to steal customers’ personal and payment

Russian Hackers Hide Zebrocy Malware In Virtual Disk Images

Russian Hackers Hide Zebrocy Malware In Virtual Disk Images Russian-speaking hackers behind Zebrocy malware have changed their technique for delivering malware to high-profile victims and started to pack the threats in Virtual Hard Drives (VHD) to avoid detection. The technique was spotted in recent spear-phishing campaigns from threat group APT28 (Fancy Bear, Sofacy, Strontium, Sednit)

Adobe Fixes Critical Security Vulnerabilities In Lightroom, Prelude

Adobe Fixes Critical Security Vulnerabilities In Lightroom, Prelude Adobe has released security updates to address critical severity security bugs affecting Windows and macOS versions of Adobe Lightroom and Adobe Prelude. In total, the company addressed four security vulnerabilities affecting three products, three of them rated as critical and one as an important severity bug in Adobe Experience

Microsoft Fixes New Windows Kerberos Security Bug In Staged Rollout

Microsoft Fixes New Windows Kerberos Security Bug In Staged Rollout Microsoft has issued security updates to address a Kerberos security feature bypass vulnerability impacting multiple Windows Server versions in a two-phase staged rollout. The vulnerability tracked as CVE-2020-16996 is exploitable remotely by attackers with low privileges as part of low complexity attacks where user interaction is not required. Affects

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us