Daily Swig

Issue:New Zealand Stock Exchange Cyber Security Threat

Description: With the Covid-19 pandemic going on, the entire world has shifted to online work, online education, i.e., almost any and every work has been shifted to the virtual mode. But with such an increase in the access of people to the internet, the risk of cyber breach has also increased. The most recent victim to fall under the effect of a cyber-attack was the New Zealand stock exchange. It was attacked the fourth consecutive as on 28th August, 2020 and around $135 billion business was disrupted

Issue:Capturing the State of Security in the Hospitality Sector Amid COVID-19 Crisis

Description: The impact of COVID-19 has turned the operations of the hospitality sector upside down. Not only is the sector struggling to recover from the huge economic crisis, but the attacks from state-sponsored attackers and organized cybercriminal groups have added additional worries.

Issue:Aggressive Adware Promised Free Stuff to Android Users Just to Stay Installed

Description: Security researchers from White Ops have discovered and tracked a vast ad fraud botnet that used dozens of Android apps pretending to offer users free items to keep the application installed for at least two weeks.

Issue:TrickBot Trojan: A Short Analysis of the Modular Banking Malware

Description: TrickBot is a well known modular banking trojan that sometimes acts as an info-stealer or malware dropper. Active since 2016, it has been updated several times with new features and modulations. Recently, it was used along with Ryuk ransomware to target several organizations.

Issue:Capturing the State of Security in the Hospitality Sector Amid COVID-19 Crisis

Description: The impact of COVID-19 has turned the operations of the hospitality sector upside down. Not only is the sector struggling to recover from the huge economic crisis, but the attacks from state-sponsored attackers and organized cybercriminal groups have added additional worries.

Issue:Aggressive Adware Promised Free Stuff to Android Users Just to Stay Installed

Description: Security researchers from White Ops have discovered and tracked a vast ad fraud botnet that used dozens of Android apps pretending to offer users free items to keep the application installed for at least two weeks.

Issue:Phishing gangs mounting high-ticket BEC attacks, average loss now $80,000

Description: Companies are losing money to criminals who are launching Business Email Compromise (BEC) attacks as a more remunerative line of business than retail-accounts phishing, APWG reveals.

Issue: Mozilla research- Browsing histories are unique enough to reliably identify users

Description: A recently published study conducted by three Mozilla employees has looked at the privacy provided by browsing histories.

Issue:Iranian hackers are selling access to compromised companies on an underground forum

Description: One of Iran's state-sponsored hacking groups has been spotted selling access to compromised corporate networks on an underground hacking forum, cyber-security firm Crowdstrike said in a report today.

Issue : New Zealand Stock Exchange Cyber Security Threat

Description: With the Covid-19 pandemic going on, the entire world has shifted to online work, online education, i.e., almost any and every work has been shifted to the virtual mode. But with such an increase in the access of people to the internet, the risk of cyber breach has also increased. The most recent victim to fall under the effect of a cyber-attack was the New Zealand stock exchange. It was attacked the fourth consecutive as on 28th August, 2020 and around $135 billion business was disrupted..

Read More

Issue: Impact of Apple’s new privacy policy on online advertisers

Description: The world over digital advertisers are increasingly getting worried and spending sleepless nights over Apple’s new privacy controls. We know that with Apple’s new operating system which the company plans to launch this fall, there will be certain changes in the way users will surf the net and accept requests from advertisers which will serve as Apple’s new market capitalization strategy.

Read More

Issue: New algorithm for facial recognition amidst Covid-19

Description: The identification and verification of a person with the use of a digital image or a video frame is called a Facial Recognition System. Generally, the algorithm works by comparing selected facial features from the facial images that are provided in the database. With the spread of the COVID-19 pandemic, people have started wearing masks to prevent themselves from the virus. The algorithm is making it difficult to identify the face with the masks, making facial recognition discovery go to vain. For this reason, people are trying to come with new solutions to recognise the faces covered with masks as accurately as possible.

Read More

Issue:'Lemon Duck' Cryptominer Aims for Linux Systems

Description: he operators behind the "Lemon Duck" cryptominer have developed new techniques to better target enterprise-grade Linux systems, according to the security firm Sophos.

Read More

Issue:Man-in-the-Middle Attack Makes PINs Useless for VISA Cards

Description: Swiss security researchers have discovered a way to bypass the PIN authentication for Visa contactless transactions.

Read More

Issue:Malicious npm package caught trying to steal sensitive Discord and browser files

Description: The npm security team has removed a malicious JavaScript library from the npm portal that was designed to steal sensitive files from an infected users' browser and Discord application.

Read More

Issue: An Outline of the Threats Disclosed in Black Hat 2020

Description: The Black Hat USA 2020 Conference went virtual for the first time this year. However, there was no lack of new security research and threat intel from high-profile speakers.


Read More

Issue:A Whopping Rise in Healthcare Cyber Incidents

Description: The healthcare sector has been under tremendous pressure with the increase in the number of those afflicted due to the COVID-19 pandemic and cybercriminals have left no stone unturned to take advantage of this situation.

Read More

Issue:The Maze Cartel Grows Bigger, SunCrypt Joins the Family

Description: The infamous Maze ransomware has been one of the most active malware in recent times. Besides targeting a large number of organizations, it has been actively working to expand its syndicate by forming new partnerships.

Read More

Issue: Spoofing the Small Business Administration (SBA): One Scam, Many Purposes

Description: Since its inception, the COVID-19 pandemic has given birth to a multitude of opportunities for threat actors looking for ways to make quick money, distribute malware, and steal credentials.

Read More

Issue: Recent Trends Among North Korean Hackers

Description: North Korean threat actors have gained immense notoriety for their constant barrage of cyberattacks on organizations and businesses across the globe.

Read More

Issue: It’s Raining Ransomware in August

Description: According to an Iomart report, large-scale breaches have mushroomed in 2020, with an increase of 273% in the first quarter as compared to the previous year. Ransomware is among the most common types of attacks and is up by 90%, as per a recent report by VMware.

Read More

Issue: Hackers Combine Homoglyph Technique With Magecart Script To Target Victims

Description: The use of a combination of fake lookalike domains, along with legitimate websites makes it difficult to prevent the Magecart attacks using a defined set of policies.

Read More

Issue: Operation Skeleton Key: 'Chimera' Hacker Group Targets Taiwanese Semiconductor Manufacturers

Description: It has been discovered that a hacker group dubbed Chimera has been targeting numerous semiconductor vendors in Taiwan using a skeleton key injector technique to steal intellectual property.

Read More

Issue: Don't get Baited! Watch Out for These Recent Phishing Scams

Description: Nearly one-third of all data breaches involved phishing in one way or another, according to a 2019 Verizon report. After passwords breach, phishing is the most preferred way for cybercriminals to infiltrate into target systems.

Read More

Copyright © IEMLabs, All rights Reserved. Design by Elementor | Developed by IEMLabs

Open chat