The recent data breach at tech firm Okta has drawn attention to the risks associated with not protecting data that is rarely given top priority in terms of security, records customer service. The help desk system, which is used by…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Report: September Sees Record Ransomware Attacks Surge
In September, a notable surge in ransomware attacks was recorded, as revealed by NCC Group’s September Threat Pulse. Leak sites disclosed details of 514 victims, marking a significant 153% increase compared to the same period last year. This figure…
The Dark Side of AI: How Cyberthreats Could Get Worse, Report Warns
A UK government report warns that by 2025, artificial intelligence could escalate the risk of cyberattacks and undermine public confidence in online content . It also suggests that terrorists could use the technology to plot chemical or biological strikes. …
ServiceNow Data Exposure Flaw Raises Concerns
ServiceNow, a popular enterprise cloud platform, was found to have a serious data exposure vulnerability. Concerns concerning the security of sensitive data in cloud-based systems have been highlighted by this occurrence, which has shocked the cybersecurity community. According to reports…
US Energy Service Shared Details on How Akira Ransomware Hacked its Network
US energy service firm BHI Energy recently shared how it compromised its network and data in a ransomware campaign conducted by the Akira ransomware. BHI Energy, a division of Westinghouse Electric Company, provides specialized engineering services and workforce solutions to…
Ransomware Kingpin Behind Ragnar Locker Arrested in Paris
An international law enforcement action coordinated by European Interpol and officials of foreign law enforcement agencies led to the removal of the Ragnar Locker ransomware group on October 20, 2023. Various law enforcement agencies including the French, American, and…
Canada Reports Targeting of Trudeau and Others by Chinese Bots
Canada has revealed the detection of a disinformation campaign believed to be linked to China, targeting numerous politicians, including Prime Minister Justin Trudeau. This campaign, termed “spamouflage,” utilized a barrage of online posts to discredit Canadian Members of Parliament,…
1Password’s Swift Response to Okta Data Breach
Prominent password manager provider 1Password has shown excellent reaction and transparency following the recent Okta data leak issue. The breach forced 1Password to take measures to protect its users’ security after it affected multiple organizations and possibly exposed sensitive user…
Balancing Promise and Pitfalls: Integrating AI into Cybersecurity
In the rapidly evolving digital landscape, the emergence of AI-driven cybersecurity offers a groundbreaking defense against modern cyber threats. However, alongside its celebrated capabilities lies a less-discussed aspect: the hidden costs and challenges associated with Artificial Intelligence (AI). The…
OpenSea Warns API Customers of Third-Party Security Breach
Following a third-party security breach that left them potentially susceptible to malicious actors, OpenSea issued a security warning to specific users, urging them to rotate their API credentials. OpenSea informed impacted customers via email that one of its vendors…
Progressive Holdings Cyberattack: Sensitive Data Stolen
Progressive Holdings, a well-known company that specializes in product leasing, has unexpectedly become the victim of a devastating cyberattack that has resulted in the unauthorized collection of private data. The breach has prompted significant worry among its stakeholders and consumers,…
The Com: Youth Hacking Ring Executing High-profile Cybercrimes
A new threat actor community recently came to light. carrying out some malicious cyberattacks. The online community, labelled as ‘the Com,’ apparently consist of young skilled hackers who are carrying out sophisticated campaigns and high-profile breaches. The hackers, who are…
Gaming Giant Nintendo Embraces Passkeys for Enhanced Security and Convenience
As passkeys continue to be more widely used as authenticators for a variety of sign-in purposes, the path towards a passwordless future is being driven forward. There are reports that this authentication method will be part of Microsoft’s Windows…
TA866 Threat Actor: Python Malware Targets Tatar-language Users
Cybersecurity researchers have discovered a new Python malware that has been targeting Tatar language-speaking users. Tatar is a Turkish native language, spoken mostly by Tatars, an ethnic group based in Russia and its neighbouring nations. The Cyble-based Python malware is…
Cyberattack Responses at MGM and Caesars Required Brutal Actions
Twin assaults on MGM Resorts and Caesars Entertainment have offered an unusual perspective at what happens when two comparable organisations, under similar attack by the same threat actor, use divergent incident response techniques. Both parties in this case were…
Accurate Eye Diagnosis, Early Parkinson’s Detection
A revolutionary advancement in the realm of medical diagnostics has seen the emergence of cutting-edge AI tools. This ground-breaking technology identifies a variety of eye disorders with unmatched accuracy and has the potential to transform Parkinson’s disease early detection. According…
Two-Year Chase: FBI Relaunches Search for Cybercriminals
The usage of sophisticated e-mail schemes by hackers to hack into the systems of law firms and public relations companies is on the rise, with hacker groups targeting law firms and public relations companies in an attempt to steal…
Akira Ransomware Adapts to Linux Systems, Incorporates New Tactics and TTPs
Arika ransomware, which initially targeted Windows systems, has evolved significantly since its emergence in March. It has now expanded its scope to include Linux servers, employing a diverse set of tactics, techniques, and procedures (TTPs). A comprehensive report by…
Sandman Hackers: Threat Actors use LuaDream Info-stealing Malware
Threat actors, known as ‘Sandman,’ have recently targeted telecommunication service providers located in the Middle East, Western Europe, and South Asia. Apparently, Sandman has used info-stealing software called ‘LuaDream’ to conduct its operations. The threat actors came to light…
Report: Insider Cybersecurity Threats have Increased 40% Over the Past Four Years
A recent study disclosed that over the past four years, the average cost of an insider cybersecurity attack has increased dramatically by 40%. In addition, the average annual cost of these cyberthreats has increased over the past 12 months,…