Auction house Christie’s is grappling with significant disruptions in its attempt to sell art and high-value items worth an estimated $840 million (£670 million) due to a sophisticated cyberattack. This incident has significantly impacted their spring auctions, which feature…
Category: CySecurity News – Latest Information Security and Hacking Incidents
LockBit Ransomware Group Challenges FBI: Opens Contest to Find Dmitry Yuryevich
LockBitSupp, the alleged administrator of the notorious LockBit ransomware group, has responded publicly to recent efforts by the Federal Bureau of Investigation (FBI) and international law enforcement to identify and apprehend him. Following the restoration of previously seized domains,…
Unjammable Navigation System Successfully Tested in Airborne Trial
The government, which helped fund the research, said it was the first test of its kind that was publicly acknowledged by the government, which may pave the way for a GPS backup system that is unjammable in the future.…
Hackers Tracking Victims with DNS Tricks
Cybercriminals have adopted a highly intricate technique known as DNS tunnelling to carry out malicious activities such as tracking victims and scanning network vulnerabilities, posing a significant threat to cybersecurity. DNS tunnelling involves the encoding of data or commands…
Mortgage Lender Hacked, Customer Credit Card Details Leaked on Dark Web
The non-bank mortgage lender Firstmac has been hit by a cyberattack, resulting in the theft and publication of customer details such as credit card numbers, passport numbers, Medicare numbers, and driver’s licence details on the dark web. Firstmac, a…
Here’s Why Tokens Are Like Treasure for Opportunistic Attackers
Authentication tokens are not tangible tokens, of course. However, if these digital IDs are not routinely expired or restricted to a single device, they may be worth millions of dollars in the hands of threat actors. Authentication tokens (…
Apple Warns Windows Users: Critical Security Vulnerability in iTunes
Apple confirms the finding of a critical security flaw in the iTunes program for Windows 10 and Windows 11 users, which could have allowed malicious attackers to execute code remotely at will. Willy R. Vasquez, a security researcher at the…
Australia’s Premier Non-Bank Lender Suffers Data Security Breach
One of Australia’s largest non-bank mortgage lenders, Firstmac, has suffered a cyberattack, which resulted in customer information such as credit card and passport numbers, Medicare numbers and driver’s licence numbers being stolen and published on the dark web. In…
Critical Infrastructure and the Importance of Safeguarding it in the Digital Age
In today’s digital age, our society relies heavily on critical infrastructure to function smoothly. These infrastructures, including power grids, water systems, and communication networks, form the backbone of our daily lives, facilitating everything from electricity distribution to internet connectivity. …
Student Hijacking: Cyberattack Exposes 8,000 Students’ Data in Hong Kong
The personal information of over 8,000 students at a private Hong Kong college has been taken and purportedly placed on the dark web, the latest in a string of cyberattacks in the city that have prompted calls for greater security.…
Can Legal Measures Slow Down Cybercrimes?
Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats and strengthen the country’s…
Cyber Criminals Exploiting MS-SQL Severs To Deploy Mallox Ransomware
The MS-SQL (Microsoft SQL) honeypot incident that took place recently highlighted the sophisticated strategies used by cybercriminals that rely on the Mallox ransomware (also known as Fargo, TargetCompany, Mawahelper, etc.). The honeypot, set up by the Sekoia researchers, was…
Ransomware Attacks Now Targeting Corporate Executives’ Children
Mandiant, a prominent cybersecurity firm and subsidiary of Google, highlights the escalating creativity of malicious hackers as corporations reinforce their cyber defenses. These hackers have extended their targets to include the children of corporate executives, employing ransomware tactics to…
26 Million Records Leaked: The Post-Millennial Hack Raises Privacy Concerns
The data from the hack of The Post Millennial conservative news website has been added to Have I Been Pwned, which recently uncovered the information of 26,818,266 people whose data had been stolen. Human Events Media Group is a…
Unlocking the Mystery: Key Fob Vulnerabilities Exposed
According to security researchers, the key fob is extremely hackable, and, in addition, it is convenient. In terms of digital security, the car key fob does not have the greatest reputation when it comes to safety. As of late,…
New Ransomware Threat Hits Hundreds of Organisations Worldwide
In a recent joint report by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), a new ransomware gang named Black Basta has been identified as breaching over 500 organisations globally between April 2022 and…
Predictive AI: What Do We Need to Understand?
We all are no strangers to artificial intelligence (AI) expanding over our lives, but Predictive AI stands out as uncharted waters. What exactly fuels its predictive prowess, and how does it operate? Let’s take a detailed exploration of Predictive AI,…
Emphasizing Post-Breach Strategies in Cybersecurity
Cybersecurity discourse heavily emphasizes prevention, yet often neglects post-breach strategies. While we invest significant effort in establishing protocols to avert attacks, breaches remain an unavoidable reality. The “IBM Cyber Security Intelligence Index” report highlights human error as a leading…
Cybercriminals Are Becoming More Proficient at Exploiting Vulnerabilities
According to Fortinet, cybercriminals have their sights on the increasing number of new vulnerabilities triggered by the expansion of online services and applications, as well as the rapid rise in the number and variety of connected devices. It’s only…
Europol Confirms Web Portal Breach: No Operational Data Stolen
In a recent incident, Europol’s Europol Platform for Experts (EPE) portal experienced a security breach. The breach occurred within a closed user group, raising concerns about data security and operational integrity. In this blog post, we delve into the details…