Category: Cybersecurity Insiders

Meet the Phishing service platform named Darcula

Cybersecurity analysts at Netcraft, an internet service company based in London, have recently uncovered a sophisticated phishing platform dubbed ‘Darcula.’ This platform, known as a phishing-as-a-service (PhaaS) operation, provides users with template-based guidance for setting up phishing websites. What sets…

Hot Topic customers targeted by Credential Stuffing attacks

Hot Topic, the American fashion retailer, experienced two waves of credential stuffing attacks in November of the previous year. Investigations have revealed that these attacks resulted in the leakage of customer information, including partial payment data. Credential stuffing involves hackers…

NHS patient data published on the Dark Web

In a concerning development, a well-known ransomware collective known as INC Ransom has recently disclosed a portion of pilfered data linked to the UK’s National Health Service (NHS) on the obscure corners of the internet known as the dark web.…

The human-AI partnership: a guide towards secure coding

[Pieter Danhieux Co-Founder and CEO, Secure Code Warrior] The doomsayers are, so far, losing the argument. The panic around AI replacing humans has been countered with a new narrative: “Let AI redefine your job rather than replace it.” According to…

Ransomware attack on Big Issue and University of Winnipeg

The Qilin Ransomware group is under scrutiny for breaching the servers of the UK-based newspaper ‘The Big Issue Group.’ Reports indicate that the perpetrators successfully accessed confidential data from the victim and are now holding the entire database hostage, encrypting…

New Zealand accuses China for hacking the Parliament

After the United Kingdom’s purported accusation against China of launching a cyber attack on its Electoral Commission in 2021, allegedly aimed at stealing data pertaining to over 40 million voters, New Zealand (NZ) government has directly pointed fingers at China…

Medusa Ransomware group demands $700k from victims

Tarrant Appraisal District (TAD), a governmental entity in Texas, has made headlines due to a sophisticated cyber attack suspected to be orchestrated by the Medusa Ransomware group. The incident came to light on March 24th, 2024, prompting an emergency meeting…

Understanding the Various Types of DDoS Attacks and Their Implications

In today’s interconnected digital world, Distributed Denial of (DDoS) attacks have emerged as a significant threat to online businesses, organizations, and even individuals. These attacks can disrupt essential services, compromise sensitive data, and incur substantial financial losses. Understanding the different…

Over 40m UK voters personal data breached in hack by China

In an unprecedented move, the United Kingdom’s government is poised to publicly accuse China of orchestrating a cyber breach into its Electoral Commission’s database. The breach, occurring between August 2021 and October 2022, saw over 40 million voter records compromised.…

Will AI augment or annex cybersecurity jobs?

By Jamal Elmellas, Chief Operating Officer, Focus-on-Security Generative AI is expected to impact 60% of jobs in advanced economies like the UK according to the International Monetary Fund (IMF), half of which will gain from enhanced productivity while the other…

Privacy concerns makes Airbnb ban security cameras indoors

Installing CCTV cameras has become a common practice in today’s society, offering a sense of security and providing potential video evidence in legal situations. However, concerns over privacy have emerged as some cameras are perceived as overly intrusive. In response…

Russia bans Microsoft followed by Amazon and Google

Russia implemented a sweeping ban on Microsoft Cloud services on March 20th, with plans to extend the prohibition to Google and Amazon web services in the coming weeks. While security analysts cite national security concerns as the primary motive, trade…

Unraveling the Cyber Threats Lurking Behind QR Codes

QR codes, once a simple tool for scanning and accessing information swiftly, have become a ubiquitous feature in our digital landscape. From restaurant menus to promotional materials, these square barcodes offer convenient access to websites, apps, and multimedia content with…

Now FCC endorses IoT products with Cyber Trust Mark Logo

The Federal Communications Commission, or FCC, is on the verge of introducing a cybersecurity labeling system for Internet of Things (IoT) products. This initiative aims to provide consumers with a clear indication of which smart devices meet basic cybersecurity standards.…

Five Steps to Overcoming Cyber Complacency

[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…

Kate Middleton Medical Record Data was hacked

The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…

United Health spends $2 billion in ransomware recovery

UnitedHealth recently disclosed that it has disbursed approximately $2 billion to its healthcare subsidiaries affected by a ransomware attack detected last month. The company also announced plans to roll out medical claims preparation software to assist customers in managing payments…

CISA Hacked and over 70m files leaked online from AT&T database

In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that its systems had been compromised by hackers, exploiting vulnerabilities within Ivanti products utilized by the federal agency. According to a CISA spokesperson, flaws within Ivanti Connect…

Ransomware attack on Fujitsu Servers

Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company. While Fujitsu has yet to…

Demystifying Serverless Security: Safeguarding the Future of Cloud Computing

Serverless computing has revolutionized the landscape of cloud computing, offering unparalleled scalability, flexibility, and cost-effectiveness. However, as organizations increasingly adopt server-less architectures for their applications, concerns about security have risen to the forefront. Understanding and effectively addressing these security challenges…

Google Chrome now offers phishing and malware protection

For those prioritizing a secure browsing experience, here’s some promising news: Google has announced that Chrome users utilizing the safe browsing mode will now receive automated protection against phishing, malware, and malicious sites. Google, renowned for its commitment to user…

Zscaler acquires Avalor for $350 million

Zscaler, a prominent player in cloud security, has made headlines with its recent acquisition of Israeli startup Avalor for a hefty $350 million. This move marks the third acquisition by Zscaler in recent times, following the purchases of Canonic for…

Ransomware news trending on Google

Alabama state websites down due to DDoS attacks Alabama state websites experienced a cyber disruption today as several government URLs were targeted by a sophisticated attack initially thought to be a variant of Ransomware but later identified as a Distributed…

Immutable data storage is last line of defense against ransomware

Ransomware attacks continue to escalate annually, prompting security analysts to advocate for strategies to combat the proliferation of malware. One recommended approach is the implementation of immutable data storage systems that are resistant to file-encrypting malware and can withstand sophisticated…

LockBit takedown surges Akira Ransomware Attacks

Following the takedown of the LockBit Ransomware group’s website in ‘Operation Cronos‘ by law enforcement agencies, there has been a notable surge in the activity of the Akira Ransomware group in recent weeks. This rise has been particularly pronounced since…

Organizations issue warning to Ransomware gangs about no money

In recent times, the landscape of cyber threats has been dominated by ransomware attacks, often involving double and triple extortion tactics. However, a new approach is emerging from publicly funded organizations, openly acknowledging their inability to pay ransoms and rendering…

Ransomware news headlines trending on Google

Ransomware Resilience: Evaluating UK’s Preparedness Strategy In the face of escalating ransomware attacks globally, no state or industry appears impervious to the threat posed by malicious malware. However, recent scrutiny suggests that the UK government’s approach to cybersecurity may be…

Cyber Attack on France government websites

Recently, hackers have shifted their attention to the government sector, with France’s government websites falling victim to sophisticated yet low-intensity cyber-attacks. A source from the office of France’s Prime Minister Gabriel Attal has suggested that these attacks on government servers…

Navigating Ransomware: Securin’s Insights and Analysis from 2023

[By Ram Movva, CEO, Securin] As ransomware attackers continue to evolve and adapt their techniques, organizations must refine and adapt their security strategies to stay ahead of these threats.    Human-augmented, actionable threat intelligence plays a critical role in every organization’s…

America to offer compensation to victims of Deep Fake AI content

Deepfake technology has become a significant concern, producing computer-generated images, videos, and audio that mimic real individuals, leading to the dissemination of misleading and often absurd content. In response, the United States government, led by President Joe Biden, is poised…

A Comprehensive Guide to Mobile Application Security Testing

With the rapid proliferation of mobile applications across various industries, ensuring the security of these apps has become paramount. Mobile application security testing is a crucial step in the development process to identify and mitigate vulnerabilities that could be exploited…

Are We Experiencing the End of Biometrics?

[By John Gallagher, Vice President of Viakoo Labs] Biometric security is often viewed as superior to passwords when it comes to protecting sensitive systems or data. The interface between physical and software security, verified by unique personal identifiers like iris…

GenAI Regulation: Why It Isn’t One Size Fits All

[By André Ferraz, CEO and Co-Founder of Incognia, the innovator in location identity solutions] Generative artificial intelligence (GenAI) is a hot topic of conversation – particularly the risks it poses to users’ online safety and privacy. With President Biden calling on…

SIM linked data security measure to defend against phishing attacks

Stolen bank account credentials have been a persistent issue in countries like Britain, the United States, Australia, and Canada, often resulting in significant financial losses. However, Singapore’s leading telecommunications company, Singtel, has introduced an innovative solution to combat such phishing…

Thinking about a Career in Network Security? Follow This Path

Network security professionals protect the confidentiality, integrity and availability of information across the network. They’re expert at applying strategies, processes and technologies that guard against unauthorized access and harm. Are you ready for a career in network security? ISC2, creator…

Google opens first ever Cyberdefense hub in Japan

Amid escalating Chinese cyber attacks targeting government infrastructure globally, Google has inaugurated its inaugural Asia-Pacific Cyberdefense center in Tokyo, Japan. This hub is poised to serve as a pivotal nexus for information exchange and research collaboration among businesses, governmental entities,…

Crowdstrike to acquire Flow Security

CrowdStrike, an American cybersecurity technology company, has officially announced its acquisition of the Israel-based startup ‘Flow Security’ for $200 million. Flow Security is known as the world’s sole provider of cloud data runtime security solutions, uniquely safeguarding data both at…

Facebook and Instagram down by Cyber Attack

Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack might be to blame. Mark Zuckerberg, fresh from a vacation in India, promptly took to Twitter, now X, to assure…

Ransomware news headlines trending on Google

Hamilton city announces emergency after ransomware attack It seems like there’s a surge in ransomware attacks lately, affecting various sectors from municipal services to healthcare and even international politics. The situation in Hamilton City sounds quite serious, especially with essential…

North Korea launches cyber-attacks on Semiconductor industry

North Korea, under the leadership of Kim Jong-un, faces stringent sanctions from Western nations, exacerbating the nation’s dire shortage of semiconductor equipment crucial for its nuclear, satellite, and intelligence operations. In response to this scarcity, North Korea has intensified its…

Proactive Patching Translates into Less Ransomware Payouts

[By Joao Correia, Technical Evangelist at TuxCare (www.tuxcare.com), a global innovator in enterprise-grade cybersecurity for Linux] Today’s threat actors are driven by a variety of potential motivators for attacking systems and networks. They may aim to disrupt entire economies, advocate…

Can ban on ransom payments block ransomware spread

Recently, the FBI initiated a global operation aimed at disrupting the infrastructure utilized by the ALPHV hackers responsible for spreading ransomware. Despite this effort, the criminal group managed to bounce back swiftly and launched even more sophisticated attacks. Just a…

Hackers simulating cyber-attacks in labs

It’s quite alarming to hear about the advancements in cyber-attacks, especially those fueled by AI and capable of causing physical damage to critical infrastructure like dams. The intersection of technology and security has always been a double-edged sword, offering both…

Healthcare Software Security: Standards and Challenges

Digital healthcare has been developing rapidly during the last decade: the enactment of the American Reinvestment and Recovery Act (ARRA) in 2009 drove the majority of healthcare organizations in the US to adopt the EHR system, the COVID-19 pandemic boosted…

LockBit Ransomware gang endorses Donald Trump as next US President

The LockBit Ransomware gang, previously subdued by law enforcement agencies worldwide, has resurfaced with its trademark double extortion tactics, targeting businesses with file-encrypting malware attacks. Interestingly, the group’s leader, ‘LockbitSupp,’ has publicly endorsed Donald Trump as the next US President,…

Ransomware infection reach extends to Data Backups

For years, IT experts have emphasized the importance of maintaining backups for data and applications, highlighting their crucial role in swiftly recovering from cyber-attacks. Indeed, having such backup systems in place can preserve data continuity during unexpected incidents, thereby minimizing…

Russia develops an AI Cyber Threat Tool to put a jolt in US democracy

Amidst growing concerns over cyber warfare, reports have surfaced regarding Russia’s advancements in artificial intelligence (AI) for spreading misinformation. Under the leadership of Vladimir Putin, Russia has allegedly developed sophisticated AI-based cyber tools aimed at manipulating news narratives, with potential…

Trending Cyber Attack news headlines on Google

APT29 moves from Government infrastructure towards Cloud Service Providers APT29, also known as Midnight Blizard or Cozy Bear and associated with Russian Intelligence, appears to have altered its approach from targeting government infrastructure to focusing on cloud service providers. This…

FTC slaps Avast with $16.5m penalty for selling browser data

It’s indeed concerning when cybersecurity solutions meant to protect users’ privacy end up compromising it instead. The case of AVAST highlights the importance of transparency and accountability in the handling of user data. Users trust these companies to safeguard their…

Cybersecurity fears trigger Cloud Repatriation

It’s interesting to see the shift in attitudes towards cloud adoption, especially considering the initial push towards it from figures like former President Trump. The concept of cloud repatriation, where organizations bring their workloads back in-house from third-party cloud services,…

2024 is Here:  Will This Be the Year We Get Passwords Right?

[By Darren James, Senior Product Manager, Outpost24] Humans have made unbelievable advancements in science and technology that have stretched the imagination and changed society forever.  But one seemingly mundane, albeit crucial, piece of wisdom continues to elude mankind – proper…

Repeat Ransomware attacks on 78% of victims who pay

In November 2019, the FBI and US-CERT jointly issued a statement advising against ransom payments to hackers, asserting that such payments could embolden cybercriminals and exacerbate cybercrime. They urged victims to instead seek guidance from law enforcement or forensic experts.…

How to Properly Handle Cyber Security Incident Management

[By Chris Debigh-White, Chief Security Officer at Next DLP] The majority of security experts adhere to the “assume breach” paradigm, which recognizes the possibility, if not the inevitability, of an attacker gaining access to an organization. This breach could occur through…

Cyber Attack news headlines trending on Google

Federal Trade Commission Clears X (formerly Twitter) of Data Security Violations Following an investigation into the server operations of X, previously known as Twitter, the Federal Trade Commission (FTC) has announced that Elon Musk’s company has upheld user privacy and…

Top 7 best Practices for Mobile Security in a BYOD Environment

In the modern workplace, the Bring Your Own Device (BYOD) trend has become increasingly prevalent, revolutionizing how businesses operate and employees collaborate. While BYOD offers flexibility and convenience, it also introduces significant security challenges, particularly in the realm of mobile…