Small businesses are becoming more concerned about payment fraud, as revealed by a recent survey from regional bank KeyBank. The survey included nearly 2,000 small-to-medium-sized businesses with annual revenues of less than $10 million. The results show that payment…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cyberattack Cripples Forklift Giant Crown Equipment’s Production
In a recent report to the company’s employees, Ohio-based Crown Equipment, which is one of the world’s largest industrial and forklift truck manufacturers, confirmed that it had been attacked by a cybercriminal organization. After a cyberattack, the company has…
From Siri to 5G: AI’s Impact on Telecommunications
The integration of artificial intelligence (AI) has significantly transformed the landscape of mobile phone networks. From optimizing network performance to enhancing user experiences, AI plays a pivotal role in shaping the future of telecommunications. In this blog post, we delve…
Young Hacker Linked to Scattered Spider Group Detained
Spanish police, aided by the FBI, have made a major breakthrough in combating cybercrime by arresting a 22-year-old man in Palma de Mallorca. The suspect, Tyler Buchanan from Dundee, Scotland, is believed to be a leading figure in the…
EU Proposes New Law to Allow Bulk Scanning of Chat Messages
The European elections have ended, and the European football tournament is in full flow; why not allow bulk searches of people’s private communications, including encrypted ones? Activists around Europe are outraged by the proposed European Union legislation. The EU…
Crafty Criminals Use Fake Error Messages to Deploy Malware via PowerShell
Criminals are targeting thousands of organizations worldwide with social engineering attacks that use fake error messages to trick users into running malicious PowerShell scripts. This new Windows malware campaign uses bogus error messages from Google Chrome, Microsoft Word, and…
Securing Corporate Data: The Crucial Role of Third-Party Access Audits
Organizations’ data and systems can be compromised by seemingly benign entities—third-party contractors, vendors, and outsourced service providers—when those entities are seemingly innocent. External entities that perform these tasks must have access to sensitive data and systems. However, improper management…
Defending Hospitals and Clinics: Strategies Against Ransomware
The healthcare industry has become a prime target for ransomware attacks in recent years. These malicious campaigns exploit vulnerabilities in healthcare systems, disrupt critical services, and compromise sensitive patient data. According to Steve Stone, president of Rubrik’s Zero Labs, ransomware…
Hackers Exploit Snowflake Data, Targeting Major Firms
Hackers who stole terabytes of data from Ticketmaster and other customers of the cloud storage firm Snowflake claim they gained access to some Snowflake accounts by breaching a Belarusian-founded contractor working with those customers. Approximately 165 customer accounts were…
The Growing Threat of Data Breaches to Australian Businesses
Data breaches are now a significant threat to Australian businesses, posing the risk of “irreversible brand damage.” A cybersecurity expert from Fortinet, a global leader in the field, has raised alarms about cybercriminals increasingly targeting the nation’s critical infrastructure.…
Hackers Reveal Their Strategy of Stealing Snowflake’s Ticketmaster Data
Ticketmaster and other organisations’ Snowflake accounts were said to have been accessed by a ShinyHunters hacker via a breach of software engineering firm EPAM Systems, validating a Mandiant report attributing some of the intrusions to third-party contractor hacks, Wired…
Could Brain-Like Computers Be a Game Changer in the Tech Industry?
Modern computing’s demand for electricity is growing at an alarming pace. By 2026, energy consumption by data centers, artificial intelligence (AI), and cryptocurrency could potentially double compared to 2022 levels, according to a report from the International Energy Agency…
When Legit Downloads Go Rogue: The Oyster Backdoor Story
Researchers from Rapid7 recently uncovered a sophisticated malvertising campaign that exploits unsuspecting users searching for popular software downloads. This campaign specifically targets users seeking legitimate applications like Google Chrome and Microsoft Teams, leveraging fake software installers to distribute the Oyster…
Hill Briefing on Encryption Canceled Suddenly by FBI
Based on emails reviewed by POLITICO, the FBI abruptly cancelled two large Hill briefings scheduled for this week about encryption, without telling staffers who were invited. A two-day virtual briefing on “warrant-proof encryption” was scheduled for congressional staff last…
Inside the Velvet Ant’s Web: F5 BIG-IP Vulnerabilities Exposed
Cybersecurity threats have evolved beyond traditional attack vectors. One such sophisticated campaign involves the exploitation of F5 BIG-IP appliances by a group known as ‘Velvet Ant.’ In this blog post, we delve into the details of this stealthy data theft…
AI Technique Combines Programming and Language
Researchers from MIT and several other institutions have introduced an innovative technique that enhances the problem-solving capabilities of large language models by integrating programming and natural language. This new method, termed natural language embedded programs (NLEPs), significantly improves the…
China-Linked Hackers Breach East Asian Firm for 3 Years via F5 Devices
The suspected China-based cyber espionage actor has been attributed with a prolonged cyber espionage attack that lasted approximately three years against an unnamed organization based in East Asia, in which the adversary allegedly established persistence using legacy F5 BIG-IP…
New ARM ‘TIKTAG’ Attack Affects Google Chrome and Linux Systems
A newly identified speculative execution attack named “TIKTAG” exploits ARM’s Memory Tagging Extension (MTE) to leak data with a success rate exceeding 95%, allowing hackers to circumvent this security feature. This discovery was detailed in a paper by researchers…
Notorious Cyber Gang UNC3944 Shifts Focus to SaaS Apps vSphere and Azure
The notorious cyber gang UNC3944, which is suspected of involvement in the recent attacks on Snowflake and MGM Entertainment, among other things, has modified its methods and is now targeting SaaS apps. According to Google Cloud’s Mandiant threat intelligence…
Securing Sensitive Data: Lessons from Keytronic’s Recent Breach
Keytronic, a prominent printed circuit board assembly (PCBA) manufacturer, recently confirmed a significant data breach. The breach occurred after the Black Basta ransomware gang leaked over 500GB of the company’s stolen data. In this blog post, we delve into the…