A severe cyberattack on Ascension, one of the largest healthcare systems in the United States, has disrupted patient care significantly. The ransomware attack, which began on May 8, has locked medical providers out of critical systems that coordinate patient…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Massive Data Breach Hits London Hospitals Following Cyber Attack
In a severe cyber attack targeting a London hospital, hackers have published a massive 400GB of sensitive data, raising significant alarm within the healthcare sector. This breach underscores the escalating threat posed by cybercriminals to critical infrastructure, especially within…
Understanding Qilin Ransomware: Threats, Origins, and Impacts on Healthcare
Qilin, also known as Agenda, is a ransomware-as-a-service operation that collaborates with affiliates to encrypt and exfiltrate data from hacked organizations, demanding a ransom in return. Despite its name deriving from a mythical Chinese creature that combines features of…
Infamous Hacker IntelBroker Breaches Apple’s Security, Leaks Internal Tool Source Code
A prominent threat actor known as IntelBroker, notorious for orchestrating several high-profile data breaches, has now set its sights on Apple. The hacker successfully leaked the company’s source code associated with several internal tools, announcing this development through a…
Fast Food Giant Jollibee Suffers Major Cyberattack, 32 Million Affected
Jollibee Foods Corp., a fast-food company specializing in Filipino fare, is investigating a report of a data breach in its delivery service system, adding its name to a growing list of companies which have been targeted by hackers in…
Behind the Breach: Understanding the Change Healthcare Cyberattack
Change Healthcare, a company that handles medical billing, claims processing, and other critical healthcare functions, fell victim to a sophisticated cyberattack. The attackers gained unauthorized access to the company’s systems, compromising a vast amount of sensitive data. The Breach UnitedHealth…
The Importance of Whitelisting Scanner IPs in Cybersecurity Assessments
In the realm of cybersecurity, ensuring the safety and integrity of a network is a multifaceted endeavor. One crucial aspect of this process is the regular assessment of potential vulnerabilities within the system. As a cybersecurity professional, our work revolves…
Cybercriminals Target UPI Payments: How to Stay Safe
The Unified Payments Interface (UPI) has transformed the infrastructure of digital transactions in India, providing a fast, easy, and secure method for payments. However, its rapid adoption has also attracted the attention of cybercriminals. This article delves into the…
New Infostealer ‘Fickle Stealer’ Targets Sensitive Data Using Multiple Distribution Methods
Security experts are raising alarms about a new infostealer named Fickle Stealer, which is being disseminated through various techniques across the internet. Fickle Stealer engages in typical malicious activities, such as stealing sensitive files, system information, browser-stored files, and…
The Speed and Efficiency of Modern Password-Cracking Techniques
With minimal expense and a bit of time, passwords can be cracked much faster than expected using a smart brute-force guessing algorithm. A recent analysis by Kaspersky revealed that 59% of 193 million real passwords were cracked in under…
Five Tips to Avoid Financial Fraud
Banks, credit card companies, the government, and a variety of other entities are continually looking for new ways to protect your money and data. But scammers never appear to be far behind. According to a 2023 Ipsos poll conducted…
Terrorist Tactics: How ISIS Duped Viewers with Fake CNN and Al Jazeera Channels
ISIS, a terrorist organization allegedly launched two fake channels on Google-owned video platforms YouTube and Facebook. CNN and Al Jazeera claimed to be global news platforms through their YouTube feeds. This goal was to provide credibility and ease the spread…
Phishing Alert: Spotting the ‘Vahan Parivahan’ Speeding Violation Ticket Scam
There is no doubt that traffic violations have also been victimized by scammers, as have most online services, as phishing has become one of the new ways in which unsuspecting victims have been tricked into giving out their personal…
Many Passwords Can Be Cracked in Under an Hour, Study Finds
If you’re not using strong, random passwords, your accounts might be more vulnerable than you think. A recent study by cybersecurity firm Kaspersky shows that a lot of passwords can be cracked in less than an hour due to…
RansomHub Ransomware Targets VMware ESXi Environments with Specialized Encryptor
The RansomHub ransomware operation is now employing a Linux encryptor specifically designed to target VMware ESXi environments during corporate attacks. Launched in February 2024, RansomHub operates as a ransomware-as-a-service (RaaS) with connections to ALPHV/BlackCat and Knight ransomware. The group…
Rider Data Compromised in Ransomware Attack on TheBus, Handi-Van
Private data of TheBus and Handi-Van customers appears to have been hacked in an alleged ransomware attack on the company that operates the transportation services. The websites for TheBus and Handi-Van have been down for four days as the…
Small Businesses Increasingly Concerned About Payment Fraud
Small businesses are becoming more concerned about payment fraud, as revealed by a recent survey from regional bank KeyBank. The survey included nearly 2,000 small-to-medium-sized businesses with annual revenues of less than $10 million. The results show that payment…
Cyberattack Cripples Forklift Giant Crown Equipment’s Production
In a recent report to the company’s employees, Ohio-based Crown Equipment, which is one of the world’s largest industrial and forklift truck manufacturers, confirmed that it had been attacked by a cybercriminal organization. After a cyberattack, the company has…
From Siri to 5G: AI’s Impact on Telecommunications
The integration of artificial intelligence (AI) has significantly transformed the landscape of mobile phone networks. From optimizing network performance to enhancing user experiences, AI plays a pivotal role in shaping the future of telecommunications. In this blog post, we delve…
Young Hacker Linked to Scattered Spider Group Detained
Spanish police, aided by the FBI, have made a major breakthrough in combating cybercrime by arresting a 22-year-old man in Palma de Mallorca. The suspect, Tyler Buchanan from Dundee, Scotland, is believed to be a leading figure in the…