Jollibee Foods Corp., a fast-food company specializing in Filipino fare, is investigating a report of a data breach in its delivery service system, adding its name to a growing list of companies which have been targeted by hackers in…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Behind the Breach: Understanding the Change Healthcare Cyberattack
Change Healthcare, a company that handles medical billing, claims processing, and other critical healthcare functions, fell victim to a sophisticated cyberattack. The attackers gained unauthorized access to the company’s systems, compromising a vast amount of sensitive data. The Breach UnitedHealth…
The Importance of Whitelisting Scanner IPs in Cybersecurity Assessments
In the realm of cybersecurity, ensuring the safety and integrity of a network is a multifaceted endeavor. One crucial aspect of this process is the regular assessment of potential vulnerabilities within the system. As a cybersecurity professional, our work revolves…
Cybercriminals Target UPI Payments: How to Stay Safe
The Unified Payments Interface (UPI) has transformed the infrastructure of digital transactions in India, providing a fast, easy, and secure method for payments. However, its rapid adoption has also attracted the attention of cybercriminals. This article delves into the…
New Infostealer ‘Fickle Stealer’ Targets Sensitive Data Using Multiple Distribution Methods
Security experts are raising alarms about a new infostealer named Fickle Stealer, which is being disseminated through various techniques across the internet. Fickle Stealer engages in typical malicious activities, such as stealing sensitive files, system information, browser-stored files, and…
The Speed and Efficiency of Modern Password-Cracking Techniques
With minimal expense and a bit of time, passwords can be cracked much faster than expected using a smart brute-force guessing algorithm. A recent analysis by Kaspersky revealed that 59% of 193 million real passwords were cracked in under…
Five Tips to Avoid Financial Fraud
Banks, credit card companies, the government, and a variety of other entities are continually looking for new ways to protect your money and data. But scammers never appear to be far behind. According to a 2023 Ipsos poll conducted…
Terrorist Tactics: How ISIS Duped Viewers with Fake CNN and Al Jazeera Channels
ISIS, a terrorist organization allegedly launched two fake channels on Google-owned video platforms YouTube and Facebook. CNN and Al Jazeera claimed to be global news platforms through their YouTube feeds. This goal was to provide credibility and ease the spread…
Phishing Alert: Spotting the ‘Vahan Parivahan’ Speeding Violation Ticket Scam
There is no doubt that traffic violations have also been victimized by scammers, as have most online services, as phishing has become one of the new ways in which unsuspecting victims have been tricked into giving out their personal…
Many Passwords Can Be Cracked in Under an Hour, Study Finds
If you’re not using strong, random passwords, your accounts might be more vulnerable than you think. A recent study by cybersecurity firm Kaspersky shows that a lot of passwords can be cracked in less than an hour due to…
RansomHub Ransomware Targets VMware ESXi Environments with Specialized Encryptor
The RansomHub ransomware operation is now employing a Linux encryptor specifically designed to target VMware ESXi environments during corporate attacks. Launched in February 2024, RansomHub operates as a ransomware-as-a-service (RaaS) with connections to ALPHV/BlackCat and Knight ransomware. The group…
Rider Data Compromised in Ransomware Attack on TheBus, Handi-Van
Private data of TheBus and Handi-Van customers appears to have been hacked in an alleged ransomware attack on the company that operates the transportation services. The websites for TheBus and Handi-Van have been down for four days as the…
Small Businesses Increasingly Concerned About Payment Fraud
Small businesses are becoming more concerned about payment fraud, as revealed by a recent survey from regional bank KeyBank. The survey included nearly 2,000 small-to-medium-sized businesses with annual revenues of less than $10 million. The results show that payment…
Cyberattack Cripples Forklift Giant Crown Equipment’s Production
In a recent report to the company’s employees, Ohio-based Crown Equipment, which is one of the world’s largest industrial and forklift truck manufacturers, confirmed that it had been attacked by a cybercriminal organization. After a cyberattack, the company has…
From Siri to 5G: AI’s Impact on Telecommunications
The integration of artificial intelligence (AI) has significantly transformed the landscape of mobile phone networks. From optimizing network performance to enhancing user experiences, AI plays a pivotal role in shaping the future of telecommunications. In this blog post, we delve…
Young Hacker Linked to Scattered Spider Group Detained
Spanish police, aided by the FBI, have made a major breakthrough in combating cybercrime by arresting a 22-year-old man in Palma de Mallorca. The suspect, Tyler Buchanan from Dundee, Scotland, is believed to be a leading figure in the…
EU Proposes New Law to Allow Bulk Scanning of Chat Messages
The European elections have ended, and the European football tournament is in full flow; why not allow bulk searches of people’s private communications, including encrypted ones? Activists around Europe are outraged by the proposed European Union legislation. The EU…
Crafty Criminals Use Fake Error Messages to Deploy Malware via PowerShell
Criminals are targeting thousands of organizations worldwide with social engineering attacks that use fake error messages to trick users into running malicious PowerShell scripts. This new Windows malware campaign uses bogus error messages from Google Chrome, Microsoft Word, and…
Securing Corporate Data: The Crucial Role of Third-Party Access Audits
Organizations’ data and systems can be compromised by seemingly benign entities—third-party contractors, vendors, and outsourced service providers—when those entities are seemingly innocent. External entities that perform these tasks must have access to sensitive data and systems. However, improper management…
Defending Hospitals and Clinics: Strategies Against Ransomware
The healthcare industry has become a prime target for ransomware attacks in recent years. These malicious campaigns exploit vulnerabilities in healthcare systems, disrupt critical services, and compromise sensitive patient data. According to Steve Stone, president of Rubrik’s Zero Labs, ransomware…