Types of SQL Injection: Attack Examples

Types of SQL Injection: Attack Examples

As we wrote in one of the articles, SQL is a structured query programming language (SQL, Structured Query Language) that allows programmers to communicate with large databases in almost plain English. It also gives the ability to access and manipulate data stored in tables on the server. In the case of websites, the tables can… Continue reading Types of SQL Injection: Attack Examples

Malware VS Ransomware: What’s the Difference?

To deal with any problem successfully you should first have a clear understanding of what you are dealing with. Nowadays the cyber threat landscape has expanded enormously with online cyber threat elements prevailing. And it would be erroneous to think that only specialists from the IT field need to know what they might come across… Continue reading Malware VS Ransomware: What’s the Difference?

Critical Vulnerability in UNISOC Devices Patched

UNISOC-chip Android Phones are Vulnerable to Remote Modem-Targeting Attacks In May 2022, the UNISOC company was informed by Check Point Research specialists about a critical vulnerability present in UNISOC chipset devices. The flaw was confirmed by the manufacturer and patched. The vulnerability revelation happened after reverse-engineering of UNISOC LTE protocols (long-term evolution, wireless connection standard… Continue reading Critical Vulnerability in UNISOC Devices Patched

Clipminer – a Million Dollar Clipboard Hijacking Coinminer

Clipminer Malware A bizarrely efficient botnet cryptocurrency miner has been revealed by Symantec security experts. Besides its classic mining function, it has a feature of clipboard hijacking, thence comes the name of this malware – “Clipminer.” That feature alone has brought its developers approximately $1.7M. Let’s begin with the insertion. The Trojan-carried WinRAR archive originates… Continue reading Clipminer – a Million Dollar Clipboard Hijacking Coinminer

CMD-Based Ransomware YourCyanide With Info-Stealing Functions

New Threat: YourCyanide Ransomware CMD-based ransomware YourCyanide, currently under development, has been found and analyzed recently by the Trend Micro group of malware researchers. The malware in question does not yet do the data encryption, but it performs almost all the rest of the functionality. Although YourCyanide contains many additional functions, its genealogy hints that… Continue reading CMD-Based Ransomware YourCyanide With Info-Stealing Functions

What is Spear Phishing? Definition with Examples

Spear phishing is a type of phishing attack that targets specific individuals or organizations typically through malicious emails. For example, cybercriminals can pretend to be a trusted person or organization and thus try to make the victim enter confidential data, such as logins and passwords, or install malware. Such attacks are divided into the whaling… Continue reading What is Spear Phishing? Definition with Examples

Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

Photo: INTERPOL

North Africa, Southeast Asia, and Middle East oil and gas companies became cyberfraud victims. Interpol arrested three citizens of Nigeria in the country’s capital city Lagos as a part of an international operation dubbed Killer Bee. The men were suspected of using Agent Tesla remote administration tools (RAT) to redirect financial operations and corporate classified… Continue reading Three Online Scammers Arrested in Nigeria in an Interpol’s Operation

29 Moonbirds Stolen via Link Click from a Proof Collective Member

29 Moonbirds, NFTs amounting to around 750 ETC (approximately $1,5M) in value, were stolen from an unmentioned Proof Collective member as a result of a scam, according to the May 25 tweet by @CirrusNFT. The theft happened as the victim clicked an unchecked link signing a transaction offered by a scammer who pretended to be… Continue reading 29 Moonbirds Stolen via Link Click from a Proof Collective Member