Avatar photo

Dwaine Evans

Dwaine Evans' wheelhouse is digital wealth management. His profile features in-depth research and analysis on cyber security and platform advocates for DevOps and its revolutionary potential across various industries. Dwaine's content is geared toward industry professionals looking to make changes, which he highlights through his detailed analyses at the prospects wealth management has to offer. 
Hackers Exploit QNAP Devices: Active Exploitation of QNAP VioStor NVR Vulnerability Discovered
Cyber Security
Hackers Exploit QNAP Devices: Active Exploitation of QNAP VioStor NVR Vulnerability Discovered

The increasing reliance on network-attached storage (NAS) devices has made them an attractive target for hackers. QNAP devices, in particular, have become a favored choice for attackers due to their susceptibility to known vulnerabilities and misconfigurations. In this article, we delve into the latest findings by cybersecurity researchers at Akamai, who have discovered active exploitation of the QNAP VioStor Network

Read More
The Rising Threat of Joint Ransomware Attacks: Unveiling the Cyber-Extortion Trinity
Cyber Security
The Rising Threat of Joint Ransomware Attacks: Unveiling the Cyber-Extortion Trinity

The cybersecurity landscape has been marred by a growing trend of joint ransomware attacks carried out by multiple cybercriminal groups. This article delves into the emergence of the Cyber-Extortion Trinity, its collaboration in launching a joint extortion campaign against financial services companies, and the role of Initial Access Brokers (IABs) and Dark Web groups in facilitating such attacks. The Cyber-Extortion

Read More
Hotels on Booking.com at Risk as Fraudsters Continue to Exploit Security Lapses
Cyber Security
Hotels on Booking.com at Risk as Fraudsters Continue to Exploit Security Lapses

Hotels that use the popular online travel site, Booking.com, are being targeted by fraudsters due to not enabling two-factor authentication. This concerning trend has resulted in a rise in compromised accounts and fraudulent activities, leaving both hotels and their customers susceptible to cybercrime. Malware and Monetization Fraudsters employ various tactics to target properties, and once successful, they proceed to monetize

Read More
Major US mortgage lender Mr. Cooper discloses data breach impacting millions of individuals
Cyber Security
Major US mortgage lender Mr. Cooper discloses data breach impacting millions of individuals

In a major data breach revelation, Mr. Cooper, a leading US mortgage lender, has disclosed that the sensitive details of millions of individuals have been exposed. The breach has prompted the company to temporarily shut down its services while it investigates the incident and takes necessary steps to mitigate the damage caused. Scope of the Data Breach The extent of

Read More
VF Corp Faces Disruptions and Data Breach in Suspected Ransomware Attack During Holiday Shopping Rush
Cyber Security
VF Corp Faces Disruptions and Data Breach in Suspected Ransomware Attack During Holiday Shopping Rush

The final holiday shopping rush took an unexpected turn for VF Corp, a global apparel and footwear company, as it fell victim to a suspected ransomware attack. This disruptive incident has severely impacted the company’s global business operations, leaving customers and executives alike concerned about the extent of the breach and the potential consequences. Confirmation of Unauthorized Occurrences VF Corp

Read More
Recent Cybersecurity Breaches: Exposing Vulnerabilities and Encouraging Global Collaborative Action
Cyber Security
Recent Cybersecurity Breaches: Exposing Vulnerabilities and Encouraging Global Collaborative Action

In recent times, the world has witnessed a series of impactful cybersecurity incidents, shedding light on the ever-growing need for robust defense mechanisms. This article provides a comprehensive overview of several significant breaches, including the MongoDB phishing email attack, VF Corp.’s disruption during the holiday shopping season, National Grid’s concerns about Chinese technology involvement, the dismantling of the darknet marketplace

Read More
Technical Issue Disrupts Block Production on Zilliqa Blockchain
DevOps
Technical Issue Disrupts Block Production on Zilliqa Blockchain

In a setback for the Zilliqa blockchain network, a technical issue has resulted in an interruption to block production. This issue has had significant implications, with daily transactions on Zilliqa plummeting by approximately 50%. The lack of new blocks being produced since the last transaction has raised concerns. However, the team at Zilliqa is diligently working to rectify the issue

Read More
Xfinity Notifies Customers of Data Compromise in Cyberattack Exploiting Citrix Bleed Vulnerability
Cyber Security
Xfinity Notifies Customers of Data Compromise in Cyberattack Exploiting Citrix Bleed Vulnerability

In a recent development, Comcast’s Xfinity has informed its customers that their information has been compromised in a cyberattack that took advantage of a vulnerability known as CitrixBleed. This breach has once again highlighted the importance of robust cybersecurity measures to protect sensitive data. CitrixBleed vulnerability CitrixBleed, officially tracked as CVE-2023-4966, is a critical vulnerability that affects Citrix’s Netscaler ADC

Read More
Shaping the Future of Digital Wealth: Strategic Partnerships and Innovation in Canada
Digital Wealth Management
Shaping the Future of Digital Wealth: Strategic Partnerships and Innovation in Canada

North Star Consultants, a Toronto-based wealth management compliance advisory firm, and FusionIQ Canada, a digital wealth management platform developer, recently announced their partnership. Their goal is to bring seamless and efficient solutions to the wealth management industry, promising enhanced capabilities for advisors in Canada. The collaboration aims to revolutionize their day-to-day operations and client interactions. North Star Consultants and FusionIQ

Read More
Microsoft Takes Down Cybercrime Group Storm-1152 and Disrupts Illicit Activities
Cyber Security
Microsoft Takes Down Cybercrime Group Storm-1152 and Disrupts Illicit Activities

In a significant move against cybercriminals, Microsoft has successfully seized domains and social media accounts belonging to a notorious cybercrime actor known as Storm-1152. This article delves into the scope of Storm-1152’s activities, the impact it had on Microsoft and its clients, and the actions taken by Microsoft to bring down this formidable foe. Overview of Storm-1152’s fraudulent activities Storm-1152

Read More
Threat Actors Targeting Recruiters Disguised as Job Applicants: A Detailed Analysis of the FIN6 Cybercrime Group’s Attack Techniques
Cyber Security
Threat Actors Targeting Recruiters Disguised as Job Applicants: A Detailed Analysis of the FIN6 Cybercrime Group’s Attack Techniques

The landscape of cybercrime is constantly evolving, with threat actors employing new tactics to infiltrate systems and compromise sensitive data. In recent years, a growing trend has emerged, where threat actors target recruiters by masquerading as job applicants. This article delves into the intricacies of this attack vector, highlighting the attribution to the notorious FIN6 cybercrime group and providing a

Read More
Global Law Enforcement Takes Down BlackCat Ransomware Group, Offers Key to Over 500 Victims
Cyber Security
Global Law Enforcement Takes Down BlackCat Ransomware Group, Offers Key to Over 500 Victims

In a major breakthrough, global law enforcement agencies have successfully dismantled the ALPHV/BlackCat ransomware group’s leak site. This significant takedown was the result of a coordinated effort by law enforcement agencies from multiple countries. The operation has dealt a severe blow to the notorious cybercriminal organization, providing relief to countless victims held hostage by their nefarious activities. The FBI urges

Read More