CVE-2021-1572
CVE-2021-1572
Google recently removed eight fraudulent cryptocurrency mining apps from its official app store that is Play Store. All the eight fake mining apps removed were loaded with fraudulent functions like watching Ads and paying for subscription services. The cybersecurity experts at Trend Micro analyzed all the eight apps that were removed from the Play Store…
A recent massive cyberattack involving wiper malware Meteor was successful in destroying Iran’s national rail infrastructure as well as the ministry of transportation’s website, resulting in significant train service interruptions throughout the country, according to The Hacker News. On July 9, the Iranian train system was rendered obsolete as a result of a massive attack…
Governance & Risk Management , Patch Management Experts Say Advisory Highlights Vulnerability Management Challenges Dan Gunderman (dangun127) • July 30, 2021 Source: CISA A joint cybersecurity advisory issued by several agencies this week highlighting the ongoing exploits of longstanding software vulnerabilities illustrates the woeful state of patch management, security experts say. See Also:…
Fraud Management & Cybercrime , Ransomware Accenture Security: Attackers Focus on Those With Over $1 Billion in Revenue Prajeet Nair (@prajeetspeaks) • July 2, 2021 Hades ransom note (Source: Accenture Security) At least seven companies with annual revenue of over $1 billion have been hit so far this year by Hades ransomware, according…
The US Securities and Exchange Commission has warned investors to be “extremely wary” of potential investment scams related to Hurricane Ida’s aftermath. This alert comes from SEC’s Office of Investor Education and Advocacy, which regularly issues investor alerts to warn investors about the latest investment frauds and scams. Scammers will likely set their targets on those who…
The Department of Defense (DOD) position is that systems produced by Da Jiang Innovations (DJI) pose potential threats to national security. Existing DOD policy and practices associated with the use of these systems by U.S. government entities and forces working with U.S. military services remain unchanged contrary to any written reports not approved for release…