<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cyble Inc. &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<atom:link href="https://risk-academy.ru/tag/cyble-inc/feed/" rel="self" type="application/rss+xml" />
	<link>https://risk-academy.ru</link>
	<description>Управление рисками, риск менеджмент, обучение по управлению рисками, тренинг риск менеджмент</description>
	<lastBuildDate>Sun, 30 Aug 2020 17:44:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://raruswebsite.s3.amazonaws.com/wp-content/uploads/2018/02/10213225/cropped-favicon-32x32.png</url>
	<title>Cyble Inc. &#8211; РИСК-АКАДЕМИЯ &#8211; АНО ДПО ИСАР</title>
	<link>https://risk-academy.ru</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Paytm Mall suffers data breach, ransom demanded by hackers: Report</title>
		<link>https://risk-academy.ru/paytm-mall-suffers-data-breach-ransom-demanded-by-hackers-report/</link>
		
		<dc:creator><![CDATA[riskacademy]]></dc:creator>
		<pubDate>Sun, 30 Aug 2020 17:44:06 +0000</pubDate>
				<category><![CDATA[Cyber Risks]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[e-commerce]]></category>
		<category><![CDATA[South Korea]]></category>
		<category><![CDATA[John Wick]]></category>
		<category><![CDATA[PAYTM]]></category>
		<category><![CDATA[Cyble Inc.]]></category>
		<category><![CDATA[Paytm Mall]]></category>
		<category><![CDATA[ZEE5]]></category>
		<category><![CDATA[E-commerce in India]]></category>
		<guid isPermaLink="false">https://risk-academy.ru/paytm-mall-suffers-data-breach-ransom-demanded-by-hackers-report/</guid>

					<description><![CDATA[E-commerce platform Paytm Mall has suffered a massive data breach, where a cybercrime group under the alias ‘John Wick’ has been able to get unrestricted access to the entire database [&#8230;]]]></description>
										<content:encoded><![CDATA[<div id="mainArea">
<div class="FirstEle">
<p>
E-commerce platform Paytm Mall has suffered a massive data breach, where a cybercrime group under the alias ‘John Wick’ has been able to get unrestricted access to the entire database of the company, according to US-based cyber-risk intelligence platform Cyble Inc.</p>
</p></div>
<div class="paywall">
<p>According to Cyble, ‘John Wick’ has broken into multiple Indian companies and collected ransom from various Indian organizations including OTT platform Zee5, fintech startups, Stashfin, Sumo Payroll, Stashfin, i2ifunding, through other aliases such as ‘South Korea’ and ‘HCKINDIA’.</p>
<p>‘John Wick’ was able to upload a backdoor or Adminer on Paytm Mall application website and was able to gain unrestricted access to their entire databases […] According to the messages forwarded to us by the source, the perpetrator claimed the hack happened due to an insider at Paytm Mall. The claims, however, are unverified, but possible,&#8221; said a Cyble blogpost on Sunday.</p>
<p>According to Cyble, its sources also forwarded them messages where the perpetrator claims to have demanded 10 Ethereum (ETH), equivalent to $4,000 and is receiving the ransom payment from the Paytm Mall.</p>
<p>One of the tactics&#8230;</p>
</div>
</div>
<p><a href="https://www.livemint.com/companies/news/paytm-mall-suffers-data-breach-ransom-demanded-by-hackers-cyble-report-11598793039641.html">Read More&#8230;</a></p>
<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- RA -->
<ins class="adsbygoogle"
     style="display:inline-block;width:728px;height:90px"
     data-ad-client="ca-pub-6192158489792937"
     data-ad-slot="6411604661"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
