Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software
29th July 2021, Kathmandu
A malware kenned for targeting macOS OS has been updated once more to integrate more features to its toolset that sanctions it to amass and exfiltrate sensitive data stored during a sort of apps, including...
Pressure Grows on Valve to Unplug Steam Gaming Platform Vulnerabilities
18th April 2021, Kathmandu
Stress is rising on video games writer Valve after two units of safety researchers got here ahead with complaints that it has been sluggish at resolving safety flaws...
5 Steps to Amending Ransomware Resiliency
26th July 2021, Kathmandu
Alex Restrepo, the cybersecurity researcher at Veritas, lays out the key concepts that organizations should be fixating on now and implementing today.
The ransomware landscape is evolving, and ransomware...
Hackers from China implanted PlugX Variant on MS Exchange Servers
29th July 2021, Kathmandu
Hackers from China implanted PlugX Variant on MS Exchange Servers after Compromise. A Chinese cyberespionage organization targeting Southeast Asia took advantage of a vulnerability in the Microsoft Exchange...
Pegasus Spyware – The Ghost in the Machine
10th November 2021, Kathmandu
The most moving cybersecurity news last month was about the Pegasus Spyware incident. This isn't whenever we've first caught wind of Pegasus; recall the 2019 occurrence where Pegasus...
Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers
30th July 2021, Kathmandu
A Chinese cyberespionage group kenned for targeting Southeast Asia leveraged imperfections within the Microsoft Exchange Server that came to light earlier this March to deploy an anteriorly undocumented variant of a foreign access trojan...
Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler
22nd March 2023, Kathmandu
Trend Micro, a global cybersecurity leader, today released new research* revealing that while global organizations plan to increase cybersecurity budgets in 2023, business leaders hold conflicting views on...
Fault in Preprocessor Language Less.js Root Website to Rift AWS Secret
13th July 2021, Kathmandu
A vulnerability in popular preprocessor language Less.js might be exploited to realize remote code execution (RCE) against websites that permit users to input Less.js code, researchers have alerted.
Less.js stands...
Biden Administration and Tech Giants Come Together to Raise Bar on Cybersecurity
28th August 2021, Kathmandu
To address the ascending cyber threat landscape in the U.S., Biden Administration and tech giants such as Google, Microsoft, Apple, and IBM, have converged to ameliorate the security...
India’s Koo App Found Vulnerable to Critical Worm Attacks
9th August 2021, Kathmandu
India’s Koo app which is a Twitter-like Service was found Vulnerable to critical worm attacks.
A critical security vulnerability that could have been utilized to run arbitrary JavaScript code...
What is DDOS and how can I Better Defend My Business Against this Threat?
22 April 2021, Kathmandu
With every step that our world takes into the digital age, the risk of cyber attack becomes a more and more daunting threat. Of the many types of cyberattacks,...
Joker Billing Fraud Malware Found in Google Play Store
24th July 2021, Kathmandu
Firstly we know that Joker Malware is a Trojan Malware that secretly enters a user's device through an infected application.
The joker malware is mostly infected in apps it...
Cyber-Threat Detections Hit a Record-Breaking 146 Billion in 2022
9th March 2023, Kathmandu
Trend Micro, a global cybersecurity leader, today announced a massive 55% increase in overall threat detections in 2022 and a 242% surge in blocked malicious files, as threat...
National Planning Commission’s Website Hacked
17th April 2023, Kathmandu
The website of the National Planning Commission has been hacked. After the hack, the DNS records of the National Planning Commission's website have been taken down.
According to the...
Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2own 2021
13th April 2021, Kathmandu
The Spring 2021 edition of the Pwn2Own hacking contest ended last week on April 8 with a three-way tie between researchers from Team Dev core, OV and Computes,...
Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks
11th April 2021, Kathmandu
Industrial enterprises successful Europe are people of campaign, which forced a shutdown of concern processes successful astatine slightest 1 of its victims’ networks, according to researchers.
Threat actors are...
BlackMatter Group Demands $5.9 Mn Ransom After Attacking NEW Cooperative
28th September 2021, Kathmandu
The Biden administration is trying to investigate ransomware attacks, attackers are targeting the critical infrastructures in the country. The farm services provider is the latest victim of ransomware...
Malicious COVID-19 Vaccine SMS that Includes Android Phones Spreading
17th May 2021, Kathmandu
Malicious COVID-19 vaccine SMS that includes Android phones spreading: Cyber agency. With people facing to book vaccination place in India, a new message which claims to provide registration...
Phishing Attacks Resumed in the Name of Telecom and Ncell
5th August 2021, Kathmandu
Telecommunication service providers Nepal Telecom and Ncell have been found to have another phishing attack.
Phishing attacks are taking place on the social network Facebook with posts including names,...
Critical Flaws Affect Embedded TCP/IP Stack Widely Used in Industrial Control Devices
5th August 2021, Kathmandu
Cybersecurity researchers on Wednesday disclosed 14 susceptibilities affecting a commonly-used TCP/IP stack utilized in many Operational Technology (OT) contrivances manufactured by no fewer than 200 vendors and deployed in manufacturing...
How Tractable Built an AI Unicorn in 6 Years?
26th July 2021, Kathmandu
Today, the worth of Tractable is $1 billion. A leading AI company, Tractable has products that helped many of the largest P&C insurers, manufacturers, fleet owners worldwide along...
Security Startup Verkada’s Surveillance Cameras at Tesla
13th April 2021, Kathmandu
Security Startup Verkada's Surveillance Cameras at Tesla, Hundreds of More Businesses Breached
A small group of hackers viewed live and archived surveillance footage from hundreds of businesses including Tesla...
Tips to Make Safe and Secure Digital Transactions in Nepal
27th February 2023, Kathmandu
Recently, the banking system of Nepal has been transformed towards digital media. With the increase in attraction to electronic transactions, the cases of fraud using technology have also...
Driving Sustainable Improvement for Medical Device Quality
13th April 2021, Kathmandu
ISACA, in collaboration with the Medical Device Innovation Consortium, the US Food and Drug Administration (FDA), and industry stakeholders, has developed the Case for Quality Voluntary Improvement Program...
U.K. NCSC Urges Brits to Avoid Pet’s Names as Passwords
16th April 2021, Kathmandu
One cannot ignore the importance of a strong password while improving security online. Using hard-to-guess passwords or passphrases provide optimum security to your devices and online accounts. However,...
Mount Locker Ransomware Aggressively Changes Up Tactics
24th April 2021, Kathmandu
Mount Locker group first announced their ransomware-as-a-service offering in the second half of 2020, and attacks attributed to the variant have been on the rise since. In early...
Nexusguard Research Reveals Worldwide Distributed Denial of Service Attacks
4th July 2023, Kathmandu
Nexusguard’s DDoS Statistical Report for 2022 Indicates Global Shift in Attack Landscape.
In 2022, the total number of distributed denial of service (DDoS) attacks worldwide increased by 115.1% over...
Coursera Fails API Security Test in Researchers’ Security Exam
10th July 2021, Kathmandu
The difficulty APIs involve numerous uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) emerges and displays secret data and information.
Coursera is an...
Is Automated Vulnerability Remediation the Answer?
25th April 2021, Kathmandu
Executing a well-run vulnerability management program is essential to protecting against data breaches and ensuring the availability of your IT infrastructure. What is your mean time to remediate...
Kaseya Releases Patches for Vulnerabilities Exploited in Ransomware Attack
13th July 2021, Kathmandu
Patches have been released for vulnerabilities exploited in ransomware attacks by Kaseya. A software patch has been released by software vendor Kaseya located in Florida. Critical vulnerabilities were...