Nasty macOS Malware

Nasty macOS Malware XCSSET Now Targets Google Chrome, Telegram Software

29th July 2021, Kathmandu A malware kenned for targeting macOS OS has been updated once more to integrate more features to its toolset that sanctions it to amass and exfiltrate sensitive data stored during a sort of apps, including...
Steam gaming platform

Pressure Grows on Valve to Unplug Steam Gaming Platform Vulnerabilities

18th April 2021, Kathmandu Stress is rising on video games writer Valve after two units of safety researchers got here ahead with complaints that it has been sluggish at resolving safety flaws...
Ransomware Resiliency

5 Steps to Amending Ransomware Resiliency

26th July 2021, Kathmandu Alex Restrepo, the cybersecurity researcher at Veritas, lays out the key concepts that organizations should be fixating on now and implementing today. The ransomware landscape is evolving, and ransomware...
PlugX Variant

Hackers from China implanted PlugX Variant on MS Exchange Servers

29th July 2021, Kathmandu Hackers from China implanted PlugX Variant on MS Exchange Servers after Compromise. A Chinese cyberespionage organization targeting Southeast Asia took advantage of a vulnerability in the Microsoft Exchange...
Pegasus Spyware

Pegasus Spyware – The Ghost in the Machine

10th November 2021, Kathmandu The most moving cybersecurity news last month was about the Pegasus Spyware incident. This isn't whenever we've first caught wind of Pegasus; recall the 2019 occurrence where Pegasus...
Chinese Hackers

Chinese Hackers Implant PlugX Variant on Compromised MS Exchange Servers

30th July 2021, Kathmandu A Chinese cyberespionage group kenned for targeting Southeast Asia leveraged imperfections within the Microsoft Exchange Server that came to light earlier this March to deploy an anteriorly undocumented variant of a foreign access trojan...
BRAC Bank Relies on Trend Micro Cybersecurity Solution

Research Highlights Cyber Security’s Underestimated Role as a Business and Revenue-enabler

22nd March 2023, Kathmandu Trend Micro, a global cybersecurity leader, today released new research* revealing that while global organizations plan to increase cybersecurity budgets in 2023, business leaders hold conflicting views on...
rift AWS secret keys

Fault in Preprocessor Language Less.js Root Website to Rift AWS Secret

13th July 2021, Kathmandu A vulnerability in popular preprocessor language Less.js might be exploited to realize remote code execution (RCE) against websites that permit users to input Less.js code, researchers have alerted. Less.js stands...
Biden Administration

Biden Administration and Tech Giants Come Together to Raise Bar on Cybersecurity

28th August 2021, Kathmandu To address the ascending cyber threat landscape in the U.S., Biden Administration and tech giants such as Google, Microsoft, Apple, and IBM, have converged to ameliorate the security...
Critical Worm Attacks

India’s Koo App Found Vulnerable to Critical Worm Attacks

9th August 2021, Kathmandu India’s Koo app which is a Twitter-like Service was found Vulnerable to critical worm attacks. A critical security vulnerability that could have been utilized to run arbitrary JavaScript code...
DDOS Attack

What is DDOS and how can I Better Defend My Business Against this Threat?

22 April 2021, Kathmandu With every step that our world takes into the digital age, the risk of cyber attack becomes a more and more daunting threat. Of the many types of cyberattacks,...
Joker Billing Fraud

Joker Billing Fraud Malware Found in Google Play Store

24th July 2021, Kathmandu Firstly we know that Joker Malware is a Trojan Malware that secretly enters a user's device through an infected application. The joker malware is mostly infected in apps it...
BRAC Bank Relies on Trend Micro Cybersecurity Solution

Cyber-Threat Detections Hit a Record-Breaking 146 Billion in 2022

9th March 2023, Kathmandu Trend Micro, a global cybersecurity leader, today announced a massive 55% increase in overall threat detections in 2022 and a 242% surge in blocked malicious files, as threat...
National Planning Commission Website Hacked

National Planning Commission’s Website Hacked

17th April 2023, Kathmandu The website of the National Planning Commission has been hacked. After the hack, the DNS records of the National Planning Commission's website have been taken down. According to the...
Pwn2own 2021

Windows, Ubuntu, Zoom, Safari, MS Exchange Hacked at Pwn2own 2021

13th April 2021, Kathmandu The Spring 2021 edition of the Pwn2Own hacking contest ended last week on April 8 with a three-way tie between researchers from Team Dev core, OV and Computes,...
Fortinet Flaws

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

11th April 2021, Kathmandu Industrial enterprises successful Europe are people of campaign, which forced a shutdown of concern processes successful astatine slightest 1 of its victims’ networks, according to researchers. Threat actors are...
BlackMatter Group Demands

BlackMatter Group Demands $5.9 Mn Ransom After Attacking NEW Cooperative

28th September 2021, Kathmandu The Biden administration is trying to investigate ransomware attacks, attackers are targeting the critical infrastructures in the country. The farm services provider is the latest victim of ransomware...
Malicious COVID-19 Vaccine

Malicious COVID-19 Vaccine SMS that Includes Android Phones Spreading

17th May 2021, Kathmandu Malicious COVID-19 vaccine SMS that includes Android phones spreading: Cyber agency. With people facing to book vaccination place in India, a new message which claims to provide registration...
Phishing Attacks

Phishing Attacks Resumed in the Name of Telecom and Ncell

5th August 2021, Kathmandu Telecommunication service providers Nepal Telecom and Ncell have been found to have another phishing attack.  Phishing attacks are taking place on the social network Facebook with posts including names,...
Industrial Control Devices

Critical Flaws Affect Embedded TCP/IP Stack Widely Used in Industrial Control Devices

5th August 2021, Kathmandu Cybersecurity researchers on Wednesday disclosed 14 susceptibilities affecting a commonly-used TCP/IP stack utilized in many Operational Technology (OT) contrivances manufactured by no fewer than 200 vendors and deployed in manufacturing...
AI unicorn

How Tractable Built an AI Unicorn in 6 Years?

26th July 2021, Kathmandu Today, the worth of Tractable is $1 billion. A leading AI company, Tractable has products that helped many of the largest P&C insurers, manufacturers, fleet owners worldwide along...
Enterprise Video Security

Security Startup Verkada’s Surveillance Cameras at Tesla

13th April 2021, Kathmandu Security Startup Verkada's Surveillance Cameras at Tesla, Hundreds of More Businesses Breached A small group of hackers viewed live and archived surveillance footage from hundreds of businesses including Tesla...
Secure Digital Transactions in Nepal

Tips to Make Safe and Secure Digital Transactions in Nepal

27th February 2023, Kathmandu Recently, the banking system of Nepal has been transformed towards digital media. With the increase in attraction to electronic transactions, the cases of fraud using technology have also...
Medical Device Quality

Driving Sustainable Improvement for Medical Device Quality

13th April 2021, Kathmandu ISACA, in collaboration with the Medical Device Innovation Consortium, the US Food and Drug Administration (FDA), and industry stakeholders, has developed the Case for Quality Voluntary Improvement Program...
NCSC Urges Brits

U.K. NCSC Urges Brits to Avoid Pet’s Names as Passwords

16th April 2021, Kathmandu One cannot ignore the importance of a strong password while improving security online. Using hard-to-guess passwords or passphrases provide optimum security to your devices and online accounts. However,...
Mount Locker Ransomware

Mount Locker Ransomware Aggressively Changes Up Tactics

24th April 2021, Kathmandu Mount Locker group first announced their ransomware-as-a-service offering in the second half of 2020, and attacks attributed to the variant have been on the rise since. In early...
Nexusguard Research

Nexusguard Research Reveals Worldwide Distributed Denial of Service Attacks

4th July 2023, Kathmandu Nexusguard’s DDoS Statistical Report for 2022 Indicates Global Shift in Attack Landscape. In 2022, the total number of distributed denial of service (DDoS) attacks worldwide increased by 115.1% over...
API Security Test

Coursera Fails API Security Test in Researchers’ Security Exam

10th July 2021, Kathmandu The difficulty APIs involve numerous uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) emerges and displays secret data and information. Coursera is an...
Vulnerability Remediation

Is Automated Vulnerability Remediation the Answer?

25th April 2021, Kathmandu Executing a well-run vulnerability management program is essential to protecting against data breaches and ensuring the availability of your IT infrastructure. What is your mean time to remediate...
Kaseya Patches

Kaseya Releases Patches for Vulnerabilities Exploited in Ransomware Attack

13th July 2021, Kathmandu Patches have been released for vulnerabilities exploited in ransomware attacks by Kaseya. A software patch has been released by software vendor Kaseya located in Florida. Critical vulnerabilities were...