Fraud or Fallacy? Is Meezan Bank Covering Up a Data Breach?
In a customer advisory, Meezan Bank labeled the rumors of a data breach as “entirely false.”
The bank guaranteed customers that all disputed transactions were unsecured e-commerce transactions.
They were fully covered under international chargeback mechanisms.
Furthermore, the bank also promised quick compensation for affected users.
However, the bank’s reassurances have done little to repress customer anxieties.
The question arises of how cards never used for Internet banking—or even ATMs—could be exploited for unauthorized transactions.
Cyber_Security_Channel
New APIs Discovered by Attackers in Just 29 Seconds
The most common attack types were CVE exploitation (40%), discovery (34%) and authentication checks (26%).
The most frequently probed API endpoint was named “/status,” according to the report.
Cyber_Security_Channel
US Charges 14 Members of North Korean IT Worker Scam That Bagged $88 Million in Six Years
The DoJ said the campaign had generated in excess of $88 million throughout the approximately six-years it had been in operation, with the proceeds being sent back to DPRK-controlled accounts based in China.
Cyber_Security_Channel
🔐 Protect Your Digital World with Kaspersky!
01. Safeguard: Your online life with cutting-edge cybersecurity solutions.
02. Smart Protection: Defend against threats without compromising your speed.
03. Unlimited VPN: Browse privately and securely, anywhere in the world.
04. Gamer-Friendly Mode: Stay secure without interruptions.
🚀 Your safety, redefined. Upgrade to Kaspersky today!
→ https://tglink.io/f615de5908fe
Use the above link for a special offer — exclusive to our Community members!
-----
#ad #paidpromotion #sponsored
@Cyber_Security_Channel
UK Underestimates Threat From Hostile States, Says New NCSC Head
The Annual Review highlights the way conflicts are fuelling a volatile threat landscape.
Examples include Russia's use of destructive malware against Ukrainian targets and routine attempts to interfere with the systems of NATO countries in support of its war effort.
Cyber_Security_Channel
What It Costs to Hire a Hacker on the Dark Web
If you’re wondering how big the Dark Web is, then cybersecurity software company Avast explains:
“It’s difficult to measure dark web statistics, but it’s estimated that there are tens of millions of URLs on the dark web and tens of thousands of active dark web websites, including thousands of forums and marketplaces.”
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №12; 23rd of November, 2024
Consistency is key — here is the newest issue of the value-packed CyberWeekly Newsletter from our partners at Hacklido.
Below is everything you should know, at a glance:
• Google’s AI-enhanced OSS-Fuzz found 26 open-source vulnerabilities, improving detection, raising concerns about AI blind spots.
• Change Healthcare restored services nine months after a ransomware attack that disrupted 94% of US hospitals.
• CISA’s red team audit revealed gaps in critical infrastructure defenses.
• D-Link urged users to replace EOL routers vulnerable to remote code execution.
Want more detail? Read the full breakdown here.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message to @cybersecadmin
-----
@Cyber_Security_Channel
Meta Shutters Two Million Scam Accounts in Two-Year Crackdown
Meta warned that most pig butchering scams start on dating apps, text and messaging apps, email or social media, and then move to scammer-controlled accounts on crypto apps or scam websites masquerading as investment platforms.
Cyber_Security_Channel
🚀 Scanning Networks – Pro Guide for Cybersecurity Specialists
→ Our partners at Hacklido are offering you the opportunity to grab a copy of their bestselling digital product!
Become pro in scanning networks by understanding types, mitigations and using various tools involved in network security.
You will learn:
↳ IDS & Firewall evasion
↳ Understanding networks
↳ Scanning, countermeasures and tools
New additions:
✔️Real world examples
✔️Clear commands & terminology
✔️Practice questions with explanations for each unit
Among many other useful topics…
More than 570+ sales & happy customers served!
Sailing Into Danger: DONOT APT’s Attack on Maritime & Defense Manufacturing
CRIL recently came across a campaign seemingly aimed at Pakistan’s manufacturing industry, which supports the country’s maritime and defense sectors.
After analyzing the files involved in the campaign, it was determined that the attack was linked to the known APT group DONOT.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №11; 9th of November, 2024
It has been a minute, but here is the most recent issue of the long-awaited CyberWeekly Newsletter by Hacklido.
The wide variety of content you can expect to see:
• Germany's protection for researchers
• Interpol's crackdown on cybercrime
• Google Cloud MFA requirement
• Snowflake hacking arrests
• Cisco vulnerability fixes
Make sure to follow this link for to access the entire article.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message to @cybersecadmin
-----
@Cyber_Security_Channel
Global Operation Takes Down 22,000 Malicious IPs
The first iteration of Operation Synergia was announced in February 2024 when law enforcement agencies from over 50 Interpol member countries joined forces between September and November the previous year.
Cyber_Security_Channel
Most Companies Are Bracing for a Cyberattack Within a Year
Among the various types of attacks, credential theft remained a significant threat, wherein attackers steal login information to gain unauthorised access to systems.
This often occurs through AI generated phishing or social engineering.
Cyber_Security_Channel
Exploitation of Docker remote API servers has reached a “critical level”
Hackers are exploiting unprotected Docker remote API servers to deploy malware, with researchers stating the threat has reached a “critical level” and warning organizations to act now.
Cyber_Security_Channel
DPRK Uses Microsoft Zero-Day in No-Click Toast Attacks
"Many Toast ad programs use a feature called WebView to render Web content for displaying ads," according to AhnLab researchers.
"However, WebView operates based on a browser.
Therefore, if the program creator used IE-based WebView to write the code, IE vulnerabilities could also be exploited in the program."
Cyber_Security_Channel
What Skills Will the Tech Workforce Need in 2025?
The conversation explored many tech trends expected to change the future of work as we look at the year ahead, from ongoing challenges around managing a hybrid and remote workforce to the increasing need to attract talent with the right skills.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №14; 7th of December, 2024
With a little delay, please find attached the newest issue of the CyberWeekly Newsletter from our long-lasting partners at Hacklido.
A list of topics from the other side:
• OT IoT risks
• Veeam flaws
• Deloitte hack
• Cisco vulnerability
• Cybersecurity news
• Encrypted messaging
• Legacy systems security
• Brain Cipher ransomware
• Ransomware threats, data breach
Read the full publication via the following link.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message to @cybersecadmin
-----
@Cyber_Security_Channel
Snowflake Pledges to Make MFA Mandatory
The commitment to making MFA mandatory aims to prevent similar incidents occurring in the future by ensuring a separate line of defense when an account password is compromised.
Cyber_Security_Channel
South Bend Dentist Office Notifies Patients of Data Breach
The company suggests that you take the proper steps to protect yourself if your information was exposed, including placing an initial or extended fraud alert and monitoring your bank account statements.
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №13; 1st of December, 2024
Please welcome the most recent issue of the informative CyberWeekly Newsletter from Hacklido.
What can be found inside?
• Russian hackers leveraged unsecured nearby Wi-Fi to breach networks, bypassing MFA protections.
• Another campaign exploited an old Avast driver to disable endpoint security tools through a BYOVD attack.
• DEF CON volunteers teamed up with U.S. water utilities to strengthen cybersecurity for under-resourced critical infrastructure.
• Meanwhile, SCOTUS allowed a class-action lawsuit against Meta to proceed, stemming from the Cambridge Analytica data scandal.
• Lastly, a Microsoft 365 outage disrupted services like Teams, Exchange, and SharePoint.
Visit this webpage for the full piece.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message to @cybersecadmin
-----
@Cyber_Security_Channel
GodLoader Malware Infects Thousands via Game Development Tools
The distribution of GodLoader occurred through the Stargazers Ghost Network, a malware-as-a-service platform.
Between September and October 2024, 200 GitHub repositories were used to deliver infected files, targeting gamers, developers and general users.
Cyber_Security_Channel
Ransomware Attack on Blue Yonder Disrupts U.S. Supply Chains and Retail Operations
Experts believe the fallout will be felt across the United States, as Blue Yonder’s software supports numerous Fortune 500 companies.
The attack highlights vulnerabilities in private cloud environments and the increasing threat ransomware poses to supply chain infrastructure.
Cyber_Security_Channel
T-Mobile Breached in Major Chinese Cyber-Attack on Telecoms
While T-Mobile has stated that no significant impacts to its systems or customer data have been identified, federal agencies and security experts remain concerned about the scope of the breach.
Cyber_Security_Channel
‘ClickFix’ Cyber-Attacks for Malware Deployment on the Rise
This tactic preys on users’ desire to fix problems themselves rather than alerting their IT team or anyone else.
The dialogue boxes can originate from a range of sources, including compromised websites, documents, HTML attachments and malicious URLs.
Cyber_Security_Channel
A Comprehensive Guide to the Best Options for Secure Browsing
The key players in the privacy market are Tor, VPNs, Brave, and proxies.
But they all have unique features that are better suited for some situations than others.
It is time to understand these technologies and choose the best tools to protect your privacy and improve security.
@Cyber_Security_Channel
Hacker Claims to Steal Source Code Owned by Nokia
The company’s investigation has not identified evidence that an attack has impacted any of its systems or data.
However, they assured everyone that they would continue to watch the situation actively despite not spotting a potential compromise.
Cyber_Security_Channel
Microsoft SharePoint RCE Bug Exploited to Breach Corporate Network
The attacker remained undetected for two weeks. Rapid7 determined the initial access vector to be the exploitation of a vulnerability, CVE 2024|38094, within the on-premise SharePoint server.
Cyber_Security_Channel
Fog Ransomware Targets SonicWall VPNs to Breach Corporate Networks
While the researchers aren't 100% positive the flaw was used in all cases, all of the breached endpoints were vulnerable to it, running an older, unpatched version.
Cyber_Security_Channel
Samsung Zero-Day Vuln Under Active Exploit, Google Warns
"This zero-day exploit is part of an EoP chain," Jin and Lecigne noted. "The actor is able to execute arbitrary code in a privileged camera server process.
The exploit also renamed the process name itself to 'vendor.samsung.hardware.camera.provider@3.0-service', probably for anti-forensic purposes."
Cyber_Security_Channel
📩 CyberWeekly by Hacklido — Issue №10; 19th of October, 2024
Please welcome the new issue of Hacklido's CyberWeekly Newsletter.
Here is what you can find inside:
• Apple & Google propose shorter SSL/TLS certificate lifecycles
• Iranian cyber threats targeting critical infrastructure
• CISA warns of SolarWinds vulnerabilities
• Post-quantum cryptography
Click here to begin reading the full version.
-----
→ If your Company / Project / Community wants to become a partner of Cyber Security News...
Please, do not hesitate to contact us by sending a direct message to @cybersecadmin
-----
@Cyber_Security_Channel