Cybersecurity researchers at Zscaler ThreatLabz have uncovered a concerning trend in which cybercriminals are exploiting popular web hosting and blogging platforms to disseminate malware and steal sensitive data. This sophisticated tactic, known as SEO poisoning within the realm of…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Godfather Banking Trojan Multiplies, Spreading to 1.2K Variants in 57 Nations
Over a thousand variants of the Godfather mobile banking Trojan have been detected in numerous countries worldwide, targeting a wide array of banking applications. Initially uncovered in 2022, Godfather has emerged as a pervasive malware-as-a-service tool in cybercrime circles,…
Here’s How NFTs Can Transform Asset Management
NFTs are frequently discussed in terms of their role in digital art, but beneath the surface, there is a massive, unexplored potential for revolutionising real-world asset ownership and transaction. This possibility was the focus of a recent conversation between…
Junk Ransomware: Getting the Job Done For Hackers
Sophos detects ransomware In an April 17 analysis from its Sophos X-Ops research team, cybersecurity firm Sophos observed an increase in low-cost, primitive ransomware—a boon for aspiring threat actors and a headache for defenders. It’s far more difficult to find…
The GuptiMiner Attack: Lessons Learned from a Five-Year Security Breach
In a startling revelation, security researchers from Avast have uncovered a sophisticated cyberattack that exploited vulnerabilities in the update mechanism of eScan, an antivirus service, for a staggering five years. The attack, orchestrated by unknown hackers potentially linked to…
Cryptocurrency Chaos: El Salvador’s Bitcoin Wallet Code Leaked, Privacy at Risk
There was a security breach with El Salvador’s state Bitcoin wallet, Chivo, after hackers from the group CiberInteligenciaSV leaked a part of its source code to a hacking forum. In the earlier leak of personal data belonging to nearly…
Hackers Utilize Antivirus Update Mechanism to Deploy GuptiMiner Malware
North Korean hackers have been utilizing the updating system of the eScan antivirus to infiltrate major corporate networks and distribute cryptocurrency miners via the GuptiMiner malware, according to researchers. GuptiMiner, described as a highly sophisticated threat, possesses capabilities such…
Is Online Banking Truly Safe? Understanding the Safety Loopholes in Bank Websites
In today’s increasingly digital landscape, ensuring the security of online banking platforms is paramount. With cyber threats evolving and becoming more sophisticated, financial institutions face the constant challenge of fortifying their systems against unauthorized access and data breaches. Recently,…
UnitedHealth Paid Ransom After Massive Change Healthcare Cyber Assault
The Russian cybercriminals who targeted a UnitedHealth Group-owned company in February did not leave empty-handed. “A ransom was paid as part of the company’s commitment to do everything possible to protect patient data from disclosure,” a spokesperson for UnitedHealth…
DPRK Hackers Compromise South Korean Defense Contractors
It was reported on Tuesday that the North Korean hacking groups have been mounting “all-out” cyberattacks against South Korean defence companies, infiltrating their internal networks and stealing their technical data over the past year, South Korean police said. According…
Banking Malware “Brokewell” Hacks Android Devices, Steals User Data
Security experts have uncovered a new Android banking trojan called Brokewell, which can record every event on the device, from touches and information shown to text input and programs launched. The malware is distributed via a fake Google Chrome update…
General Motors Under Fire for Secretly Spying on Drivers
In a developing story that has captured public attention, General Motors (GM) finds itself embroiled in controversy amidst accusations of clandestine surveillance and unauthorised data sharing with insurance companies. The unfolding narrative, spearheaded by investigative journalist Kashmir Hill of…
Is Your VPN Safe? Or Can It be Hacked?
A virtual private network is one of the simplest ways for consumers to secure their internet activity. VPNs utilize tunneling technology to encrypt a user’s online traffic and make it unreadable to prying eyes. This additional layer of security has…
ToddyCat APT Is Siphoning Data on ‘Industrial Scale’
ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific. Kaspersky researchers first disclosed details regarding the elusive gang’s actions…
Discord Users’ Privacy at Risk as Billions of Messages Sold Online
In a concerning breach of privacy, an internet-scraping company, Spy.pet, has been exposed for selling private data from millions of Discord users on a clear web website. The company has been gathering data from Discord since November 2023, with…
Cyberattack Fallout: UnitedHealth Reveals Personal Data Breach Impact
As part of its ongoing data breach response, UnitedHealth Group has informed its subsidiaries, Change Healthcare, that they have recently experienced a data breach. Following the February cyberattack on its subsidiary Change Healthcare, UnitedHealth Group revealed on Monday that…
Unveiling Vulnerabilities in Microsoft PlayReady DRM: Impact on Streaming Platforms
In a meticulous research endeavor, Security Explorations, a division of AG Security Research, embarked on an exhaustive analysis of Microsoft’s Warbird and Protected Media Path (PMP) technologies. The culmination of this investigation has unearthed critical deficiencies within the security…
HelloKitty Ransomware Renames to ‘HelloGookie,’ Unveils CD Projekt and Cisco Data
The operator behind the HelloKitty ransomware has rebranded it as ‘HelloGookie,’ with passwords for previously leaked CD Projekt source code, Cisco network data, and decryption keys from earlier attacks being released. Identified as ‘Gookee/kapuchin0,’ the threat actor claims to…
Here’s How to Remove Unnecessary Files from Your Android Phone’s Web Browser
The web browser on your Android phone collects a significant amount of data from the websites you visit, much of which is unnecessary to keep on your device. Regardless of whether you use Google Chrome, Mozilla Firefox, or Samsung…
Where Hackers Find Your Weak Spots: A Closer Look
Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages: Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…