Only a few times in history has a single piece of code instantly wreaked havoc on computer systems globally. Examples include the Slammer worm of 2003, Russia’s NotPetya cyberattack targeting Ukraine, and North Korea’s WannaCry ransomware. However, the recent…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Lazarus Hacking Group is Using Asian Firms to Launder Stolen Crypto
Cambodian payments company received crypto worth over US$150,000 from a digital wallet employed by North Korean hacking group Lazarus, blockchain data shows, a glimpse of how the criminal outfit has laundered funds in Southeast Asia. Huione Pay, based in…
The Financial Fallout of UnitedHealth’s Ransomware Attack
A $2.3 Billion Lesson The recent ransomware attack on UnitedHealth Group serves as a stark reminder of the vulnerabilities that even the largest corporations face. The attack, which has resulted in costs soaring to at least $2.3 billion, underscores the…
Why Passkeys Are the Future of Digital Authentication
Passwords have been a fundamental aspect of digital security for years, but they come with significant drawbacks. They are not only a hassle to remember but also vulnerable to various hacking techniques. Passkeys have emerged as a robust alternative,…
FIN7 Hacking Group Sells Custom Tool “AvNeutralizer” to Evade Endpoint Protectiono
The notorious FIN7 hacking group has been identified selling a custom tool called “AvNeutralizer,” designed to bypass detection by disabling enterprise endpoint protection software on corporate networks. Believed to be a Russian hacking group active since 2013, FIN7 initially…
Alarm Bells Ring in Germany Over Chinese Tech Advancements
During the next five years, Germany will phase out components made by Chinese companies Huawei and ZTE from its 5G wireless network. This will likely worsen its already strained ties with the second-largest economy in the world, which may…
HUMAN Team Shuts Down Major Mobile Ad Fraud Scheme
In a major development, the HUMAN Satori Threat Intelligence and Research Team has successfully dismantled a vast mobile advertising fraud operation known as “Konfety.” This scheme, which generated billions of fake ad requests each day, was designed to deceive…
60 Million Users Exposed: The Pinterest Data Breach Explained
Pinterest, the popular image-sharing platform with over 518 million monthly active users, faces a potential data leak that could affect millions of users. A hacker known as “Tchao1337” has allegedly leaked a database containing 60 million rows of Pinterest user…
SEXi Ransomware Rebrands to APT INC, Continues VMware ESXi Attacks
SEXi ransomware group and its affiliates, which have been involved in a series of cyber-attacks that began in February of this year against several organizations, have been operating under the name “APT Inc.” since June of this year. To…
New EDR Bypass Tool Advertised by FIN7 Hacking Group
SentinelOne researchers warn that the financially motivated group FIN7 is utilising various pseudonyms to promote a security evasion tool on several criminal underground forums. FIN7 created a tool called AvNeutralizer (also known as AuKill) that can circumvent safety measures.…
Vietnamese Hackers Target Indian Users with Fake WhatsApp E-Challan Messages
A highly technical Android malware campaign orchestrated by Vietnamese hackers is currently targeting Indian users via fake traffic e-challan messages on WhatsApp. Researchers from CloudSEK, a cybersecurity firm, have identified this malware as part of the Wromba family. So…
Ascension Health System Hit by Cyberattack, Personal Data Likely Compromised
In a recent cybersecurity incident, Ascension, a major health system, has disclosed that cybercriminals stole files potentially containing personal information. This comes about a month after Ascension initially reported falling victim to a ransomware attack. Ascension revealed that the…
How Ransomware is Draining Resources from Critical Infrastructure
The Rising Cost of Ransomware Attacks on Critical Infrastructure The costs of ransomware attacks on critical national infrastructure (CNI) firms have soared over the last year. According to Sophos‘ newest numbers, which were revealed today, the typical ransom payment increased…
Cyberattack Exposes Patient Data in Leicestershire
A recent cyberattack has compromised sensitive patient data in Leicestershire, affecting several healthcare practices across the region. The breach, which targeted electronic patient records, has led to significant concerns over privacy and the potential misuse of personal information. Those…
Here’s Why You Shouldn’t Use Public USB Charging Ports
We’ve all been there: stranded in a coffee shop with a dropping phone battery and no connector, only to find a free USB charging station nearby. Relieved, you plug in your device and go about your business, unaware that…
Security Nightmare with Hackers Releasing 1,000 Crore Passwords in Major Breach
Cyber-security breaches are becoming more and more prevalent and this is causing a lot of concerns amongst the public. The report by Semafor claims that some 10 billion (1,000 crore) passwords have been leaked from a hacking forum online…
Activist Hacking Group Claims Leak of Disney’s Internal Data
An activist hacking group has alleged that it leaked a substantial amount of Disney’s internal communications, including details about unreleased projects, raw images, computer code, and some login credentials. The group, known as Nullbulge, has claimed responsibility for the…
The Role of IoT in Modern Infrastructure
Imagine if someone told you in the early 2000s that entire industries would run almost by themselves, thanks to a network of connected devices. Today, this is no longer science fiction but our reality, thanks to the Internet of Things…
How to Protect Your Online Accounts from Hackers
Hackers are increasingly targeting individuals to steal cryptocurrency, access bank accounts, or engage in stalking. Although these attacks are relatively rare, it’s crucial to know how to protect yourself if you suspect someone has accessed your email or social…
NATO Collaborates with Start-Ups to Address Growing Security Threats
Marking its 75th anniversary at a summit in Washington DC this week, the North Atlantic Treaty Organization (NATO) focused on Ukraine while emphasizing the importance of new technologies and start-ups to adapt to modern security threats. In its Washington…