A new Android banking virus called ‘SoumniBot’ employs a less prevalent obfuscation technique, attacking flaws in the Android manifest extraction and parsing method. The approach allows SoumniBot to bypass typical Android security safeguards and steal information. Kaspersky researchers found and…
Category: CySecurity News – Latest Information Security and Hacking Incidents
The Rise of Bots: Imperva’s Report Reveals Rising Trends in Internet Traffic
In the intricate tapestry of the digital realm, where human interactions intertwine with automated processes, the rise of bots has become an undeniable phenomenon reshaping the landscape of internet traffic. Recent findings from cybersecurity leader Imperva unveil the multifaceted…
U.S. Dams Vulnerable to Cyber Threats
The cybersecurity of America’s dams has come under intense scrutiny, with experts warning of the potential for devastating cyberattacks. Concerns were raised during a recent hearing on cybersecurity threats to critical water infrastructure, where Senator Ron Wyden expressed fears…
Inside Job Exposed: T-Mobile US, Verizon Staff Solicited for SIM Swap Scam
T-Mobile and Verizon employees are being texted by criminals who are attempting to entice them into swapping SIM cards with cash. In their screenshots, the targeted employees are offering $300 as an incentive for those willing to assist the…
APT44: Unearthing Sandworm – A Cyber Threat Beyond Borders
APT44: Operations Against Ukraine A hacking group responsible for cyberattacks on water systems in the United States, Poland, and France is linked to the Russian military, according to a cybersecurity firm, indicating that Moscow may escalate its efforts to target…
Websites Engage in Deceptive Practices to Conceal the Scope of Data Collection and Sharing
Websites frequently conceal the extent to which they share our personal data, employing tactics to obscure their practices and prevent consumers from making fully informed decisions about their privacy. This lack of transparency has prompted governmental responses, such as…
International Cyber Fraud Ring Busted By London Police
UK Police stated that they have infiltrated a massive phishing website on the dark web that has defrauded tens of thousands of individuals, and learned that university students have turned to cyber fraud as a way to increase their…
Cisco Duo raises awareness over a breach in third-party data security, revealing the exposure of SMS MFA logs.
In the ever-evolving landscape of cybersecurity, safeguarding sensitive information and ensuring secure access to corporate networks are paramount concerns for organizations worldwide. Recently, Cisco Duo, a leading provider of multi-factor authentication (MFA) and Single Sign-On services, found itself grappling…
Unveiling the Threat: Microsoft’s Executive Speaks Out on State-Backed Hacking
The executive vice president of security at Microsoft, Charlie Bell, recently proposed that the company is the neighbourhood of foreign state-sponsored hackers in an interview with Bloomberg. It has certainly been true over the years that they are particularly…
Navigating Vulnerability Disclosure: Lessons from Delinea’s Secret Server Flaw
Recently, an incident involving Delinea’s Secret Server SOAP API highlighted the challenges faced by both parties in the disclosure process. Vulnerability Details A major flaw in Delinea’s Secret Server SOAP API was discovered this week, prompting security professionals to rush…
Ransomware Attack Targets Healthcare Giant, Change Healthcare
A recent cyberattack on Change Healthcare, a subsidiary of United Health, has led to a distressing data extortion situation, further complicating an already tumultuous ordeal. Let’s delve into the details to understand the gravity of the situation and its…
Iranian Hacker Group Blast Out Threatening Texts to Israelis
Handala, an Iranian cyber outfit, has claimed to have taken down the Iron Dome missile defence system and breached Israel’s radars. A major cyber attack is believed to have unfolded when the Handala hacking group, which is renowned for…
LightSpy Spyware: A Chinese Affair Targeting iPhone Users in South Asia
The LightSpy spyware has been used by cyberespionage groups to spy on users of iPhones, iPads, and other mobile devices in the South Asian region in a recent cyberespionage campaign. According to reports, the cybercriminals behind this cybercriminal campaign…
Combatting Counterfeit Drugs Online: BrandShield’s Success in Dismantling Illicit Websites
In the rapidly evolving landscape of online pharmaceuticals, the proliferation of counterfeit drugs poses a significant threat to consumer safety. Cybersecurity firm BrandShield has emerged as a stalwart defender in this battle, successfully dismantling over 250 websites selling counterfeit…
Zero-Day Exploitation of Palo Alto Networks Firewall Allows Backdoor Installation
Suspected state-sponsored hackers have exploited a zero-day vulnerability in Palo Alto Networks firewalls, identified as CVE-2024-3400, since March 26. These hackers have utilized the compromised devices to breach internal networks, pilfer data, and hijack credentials. Palo Alto Networks issued…
Are VPNs Undertaking To Oversee All Digital Security?
In the past decade, the services of Virtual Private Networks (VPNs) have drastically transformed. Once solely focused on providing secure internet connections, VPN companies are now expanding their offerings into comprehensive privacy and security suites. This shift reflects a…
Counting the Cost: $9.2 Trillion Annual Impact of Cybercrime Looms
According to a new Statista Market Insights report, cybercrime is rising at an unprecedented pace. Approximately one-third of the United States’ GDP or about 24 times Apple’s annual revenue in 2023 will be incurred as a result of cyberattacks,…
Hackers Use GitHub Search to Deliver Malware
Checkmarx, an application security firm, has discovered that threat actors are altering GitHub search results in order to infect developers with persistent malware. As part of the campaign, attackers were seen developing fake repositories with popular names and themes,…
The Rise of Weaponized Software: How Cyber Attackers Outsmart Traditional Defenses
As businesses navigate the digital landscape, the threat of ransomware looms larger than ever before. Each day brings new innovations in cybercriminal techniques, challenging traditional defense strategies and posing significant risks to organizations worldwide. Ransomware attacks have become increasingly…
National Security at Risk: The CFPB’s Battle Against Data Brokers
Data brokers work in secrecy, collecting personal details about our lives. These entities collect, and misuse our personal information without our explicit consent. The Rise of Data Brokers The Consumer Financial Protection Bureau (CFPB) has taken notice, and their proposed…