Clubhouse data of 1.3 million users reportedly leaked, company denies hacking

The personal data for some 1.3 million users of the social audio app Clubhouse has reportedly leaked online. According to Cyber News, the scraped data posted on the hacker forum can be used by cybercriminals to carry out targeted phishing or other types of social engineering attacks, and that such database can also be used by threat actors to brute-force the passwords of Clubhouse profiles. However, Clubhouse has denied the report of any data breach containing 1.3 million scraped records of its users. The company took to Twitter to clear…

Read More

Beware of free WiFi when shopping, warns UAE authority

Authorities have issued a fresh warning to residents, cautioning them to avoid using public WiFi networks while shopping online, as it could expose shoppers to hackers. “Using public WiFi to shop online while at public places is tremendously convenient but it might not be safe. So, use a Virtual Private Network (VPN) instead or share data from your phone as a hotspot,” said the Abu Dhabi Digital Authority (ADDA) on Twitter. The ADDA also pointed out that using a public WiFi may expose them to vulnerabilities, and, “shoppers should make…

Read More

Hacking IOT Devices? an What is IOT Threats?

Hacking IOT Devices? an What is IOT Threats? – The Internet of Things (IOT) includes different technology such as embedded sensors, microprocessors and power management devices. Security Considerations changes from device to device and application to application. the greater the amount of confidential data we send across the network, the greater the risk arises of data theft, data manipulation, data tampering as well as attacks on routers and servers. Hacking IOT Devices? an What is IOT Threats? Improper security infrastructure might lead to the following unwanted scenarious: An Eavesdropper intecepts…

Read More

Biden Needs to Respond to Russian Hacking

Biden administration officials have completed an intelligence review of alleged Russian misdeeds such as election interference and the SolarWinds hack, setting the stage for the U.S to announce retaliatory actions soon, according to three people familiar with the matter. Possible moves could involve sanctions and the expulsion of Russian intelligence officers in the U.S. under diplomatic cover, said the people, who asked not to be identified discussing private deliberations. Senior officials were expected to meet Wednesday to discuss what steps to take. One person familiar with the deliberations said the…

Read More

New APT27 Cyberespionage Campaign Unveiled

It’s just the fourth month of the year and we have already had a horde of cyber espionage campaigns. Now, another new one has been revealed by researchers. What’s going on? Kaspersky spotted a cyberespionage campaign targeted against government and military organizations in Vietnam via DLL side-loading. The campaign has been attributed to a threat actor related to Cycldek – a Chinese-speaking threat actor. Although this actor shares similarities with Cycldek, it is highly sophisticated as compared to the latter. It is hypothesized that the operators of Cycldek have joined…

Read More

Cyberattackers Jamming Productivity of Manufacturing Sector

While organizations in the manufacturing sector are moving toward the adoption of automation and IoT technologies, attackers are regularly aiming at them via the vastly exposed attack surface. Recently, several hacking groups have been observed carrying out targeted attacks on specific organizations, as well as opportunistic attacks targeting large masses. Targeted cyberattacks A large number of organizations in the manufacturing sector have specifically been targeted by cyberattackers in the past few weeks. Among these attacks, ransomware attacks turn out to be the most prominent threat. French electronics manufacturing services company…

Read More

What Is IOT (Internet Of Things) and How IOT Works?

What Is IOT (Internet Of Things)? – The Internet of Things (IoT) is an important and emerging topic in the field of technology, economics and in society in general. It is referred to as the web of connected devices, made possible from the intersection between machine-to-machine communications and big data analytics. The IoT is a future-facing development of the internet and abilities of physical devices that are eventually narrowing the gap between the virtual world and the physical world. This section deals with some of the Important IoT concepts which…

Read More

Half a billion Facebook users’ information posted on hacking website, cyber experts say

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers, cybersecurity experts say. There are records for more than 32 million accounts in the United States, 11 million in the United Kingdom, and 6 million in India, according to Alon Gal, the CTO of cyber intelligence firm Hudson Rock.Details in some cases include full name, location, birthday, email addresses, phone number, and relationship status, he said Hudson Rock showed CNN Business the phone numbers of two our…

Read More

Details from 500 million Facebook users found on website for hackers

Details from more than 500 million Facebook users have been found available on a website for hackers. The information appears to be several years old but it is another example of the vast amount of information collected by Facebook and other social media sites and the limits to how secure that information is. The availability of the data set was first reported by Business Insider. According to that publication, it contains information from 106 countries including phone numbers, Facebook IDs, full names, locations, birthdates and email addresses. Facebook has been…

Read More

What is Firewall? And Firewall Architecture

What Is Firewall? & Firewall Architecture

What is Firewall? And Firewall Architecture – Firewalls are hardware and/or software designed to prevent unauthorized access to or from a private network. They Are Placed at the junction or gateway between the two networks, which is usually a private network and a public network such as the Internet. Firewalls examine all message entering or leaving the Intranet and block those that do not meet the specified security criteria. What is Firewall? And Firewall Architecture Firewall is a software or hardware-based system located at the network gateway that protects the…

Read More