icon Book Free Consultation

Threatsploit Adversary Report
Jun 2022

  • Edition-46

  • Updated Date: June 03 , 2022

image

Description

“As cybersecurity leaders, we have to create our message of influence because security is a culture and you need the business to take place and be part of that security culture.”  — Britney Hommertzheim

Britney is right, that's for sure. Cybersecurity has a culture, just like any other culture. This can only be done if companies and top executives know what's going on in the world. And it's our job to make you aware of this. So, what's been going on in the past month?

An attacker only needs to be able to send messages to a victim through Zoom chat over XMPP protocol. The end of the game. Yes, Zoom is what we're talking about. The most important parts of this month's report are how and why this happened, how it has changed things, and what can be done about it.

A group of cybercrooks made hundreds of rubber clones of fingerprints, whose images they copied along with name & Aadhar card from south of Haryana. This news has shocked all of us. How cybercrooks are exploiting others and vulnerable population.

Razor pay were unable to reconcile receipt of ? 7,38,36,192 against 831 transactions.Only to realise that a cyberfraudster is manupulating the authorisation process of payment gateway to authenticate 831 failed transaction. Razor pay attorney has filed the suit & police is looking for the fraudster. Razor pay is ISO 27001, SOC2, PCI DSS certified, yet, this happens. No one is safe oline, we can only harden the security layer.

These are the most important parts of this month's report. Aside from that, you should care about 23 other pieces of news. Another important story is that someone broke into Ferrari's subdomain to make fake NFTs. This month's news comes from many different fields. From the government, to health to airlines. We see that no one is safe online and that all industries are at risk.

To ensure that you get the most out of your read here, we've done all in our power to help you. Distribute this issue to anybody you think would benefit from it, whether they be coworkers, friends, or business partners. We wish you a safe and pleasurable month of online exploration.

I accept the Terms and Conditions

Latest Threatsploit

grid
  • Edition-75
  • November 11

Threatsploit Adversary Report November 2024

Welcome to the November edition of the Threatsploit Adversary Report, your essential monthly resource for understanding the ever-evolving landscape of cyber threats worldwide.

grid
  • Edition-74
  • October 07

Threatsploit Adversary Report October 2024

Welcome to the October 2024 edition of the Threatsploit Adversary Report, where we shine a spotlight on the alarming rise of cyber threats impacting industries across the globe. This month,our focus turns to a notable cyberattack and supply chain compromise in pager devices inLebanon, illustrating the intricate geopolitical factors that contribute to digital exploitation in today’s interconnected world.

grid
  • Edition-73
  • September 05

Threatsploit Adversary Report September 2024

Our latest report highlights some significant cybersecurity incidents and vulnerabilities that have come to light recently. One of the notable threats is the Sitting Ducks attack.