Category: CySecurity News – Latest Information Security and Hacking Incidents

Cybercriminals Exploit Web Hosting Platforms to Spread Malware

  Cybersecurity researchers at Zscaler ThreatLabz have uncovered a concerning trend in which cybercriminals are exploiting popular web hosting and blogging platforms to disseminate malware and steal sensitive data. This sophisticated tactic, known as SEO poisoning within the realm of…

Here’s How NFTs Can Transform Asset Management

  NFTs are frequently discussed in terms of their role in digital art, but beneath the surface, there is a massive, unexplored potential for revolutionising real-world asset ownership and transaction. This possibility was the focus of a recent conversation between…

Junk Ransomware: Getting the Job Done For Hackers

Sophos detects ransomware In an April 17 analysis from its Sophos X-Ops research team, cybersecurity firm Sophos observed an increase in low-cost, primitive ransomware—a boon for aspiring threat actors and a headache for defenders. It’s far more difficult to find…

DPRK Hackers Compromise South Korean Defense Contractors

  It was reported on Tuesday that the North Korean hacking groups have been mounting “all-out” cyberattacks against South Korean defence companies, infiltrating their internal networks and stealing their technical data over the past year, South Korean police said.  According…

General Motors Under Fire for Secretly Spying on Drivers

  In a developing story that has captured public attention, General Motors (GM) finds itself embroiled in controversy amidst accusations of clandestine surveillance and unauthorised data sharing with insurance companies. The unfolding narrative, spearheaded by investigative journalist Kashmir Hill of…

Is Your VPN Safe? Or Can It be Hacked?

A virtual private network is one of the simplest ways for consumers to secure their internet activity. VPNs utilize tunneling technology to encrypt a user’s online traffic and make it unreadable to prying eyes. This additional layer of security has…

ToddyCat APT Is Siphoning Data on ‘Industrial Scale’

  ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific.  Kaspersky researchers first disclosed details regarding the elusive gang’s actions…

Where Hackers Find Your Weak Spots: A Closer Look

Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages:  Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…