Category: CySecurity News – Latest Information Security and Hacking Incidents

Rackspace has Spent $11 Million on Ransomware Cleanup So Far

  Cloud computing behemoth Rackspace reported in an earnings presentation issued earlier this month that it has already spent $10.8 million responding to a Play ransomware group attack that started late last November against its hosted Exchange environment. 30,000 Rackspace…

Beware: Government’s Alert on Smishing Scam Threat

The Indian government has now urgently warned its citizens about the threat posed by smishing scams. Smishing, a combination of the words ‘SMS’ and ‘phishing,’ is the practice of hackers sending false text messages to people in an effort to…

Quid Pro Quo Attacks: Cyber Threat to Watch Out For

  A threatening message appears out of nowhere. You owe money, or a loved one is in jeopardy, according to the sender’s unknown claims. They threaten consequences unless you cough up the cash or disclose personal information. To say the…

NightOwl App is Targeting Older Macs to Siphon User Data

  The NightOwl app, which was once a popular option for automatically transitioning between dark and light modes on macOS Mojave, has been identified to secretly store user data.  NightOwl was initially introduced in 2018 as a third-party software to…

Scarab Ransomware Toolkit: Unveiling the Ingenious Weaponry

  In a recent report, cybersecurity researchers from the ESET cybersecurity company highlighted that malware of the Scarab ransomware family has been deployed to spread its variants across global victim organizations using a malicious toolset named Spacecolon.  ESET has issued…

Here’s How AI Can Revolutionize the Law Practice

  Artificial intelligence (AI) has gained enormous pace in the legal profession in recent years, as law firms throughout the world have recognised the potential value that AI can bring to their practises.  Law companies realise significant efficiencies that increase…

Ransomware’s Alarming Surge and Active Adversaries

Ransomware attacks have increased dramatically recently, worrying the cybersecurity community and heralding a new era of cyber threats. The convergence of sophisticated tactics used by hostile actors, as described in numerous reports, highlights the necessity of increased attention and proactive…

North Korean Hacker Linked to Tornado Cash Laundering

  After authorities banned the Russian-founded cryptocurrency platform Tornado Cash over its alleged support for North Korean hackers a year ago, it has been announced that two co-founders of the cryptocurrency mixer have been charged with money laundering and other…

Google Workspace Unveils AI-Powered Security

  Google LLC announced today a set of new artificial intelligence-powered cyber defence controls, the majority of which will be deployed to its Workspace cloud platform later this year. Data loss prevention, often known as DLP, and data privacy controls…

Friend.Tech Hit by Cyber Attack

  Protecting sensitive information is now a top priority for both individuals and businesses in the digital age when data is king. The recent data breach at Friend.tech, regrettably, has once more highlighted how vulnerable our globally networked world is.…

Microsoft’s Rise as a Cybersecurity Powerhouse

Tech titan Microsoft has emerged as an unexpected yet potent competitor in the cybersecurity industry in a time of rapid digital transformation and rising cyber threats. The company has quickly evolved from its conventional position to become a cybersecurity juggernaut,…

The Role of Cryptography in Data Safety

  By using codes, the information security strategy of cryptography shields business data and communications from online threats. Security professionals describe it as the art of concealing information to guard against unauthorised access to your data.  This technique employs mathematical…

Cuba Ransomware Targets U.S. Organizations via Veeam Exploit

The notorious Cuba ransomware group has leveraged a vulnerability in the popular Veeam software to launch attacks on critical organizations within the United States. This breach underscores the escalating sophistication of cybercriminals and the pressing need for robust cybersecurity measures.…

Secure Your Wi-Fi: Spot Hacking Signs and Preventive Tips

  The discussion around being cautious regarding security while utilizing public Wi-Fi networks is well-known due to the susceptibility of these networks to compromise by criminals. Yet, it’s essential to recognize that private Wi-Fi networks are also vulnerable to hacking.…

Understanding Blagging in Cybersecurity: Tactics and Implications

  Blagging might sound intricate, resembling an elaborate hacking maneuver, yet it is remarkably simpler. Despite its less “high-tech” nature compared to other cybercrimes, blagging can inflict significant harm if businesses are unprepared. Blagging involves crafty fraudsters attempting to deceive…

Datafication: What is it and Why is it Important ?

While the word ‘datafication’ will sound like an irrelevant word, being forgotten as years went by, it actually hold much importance and impacts individual on a significant basis. And, it is not the same as ‘digitization.’ But, before this conclusive…

Top Five Cybersecurity Challenges in the AI Era

  The cybersecurity industry is fascinated by artificial intelligence (AI), which has the ability to completely change how security and IT teams respond to cyber crises, breaches, and ransomware assaults.  However, it’s important to have a realistic knowledge of the…

ChatGPT Joins Data Clean Rooms for Enhanced Analysis

ChatGPT has now entered data clean rooms, marking a big step toward improved data analysis. It is expected to alter the way corporations handle sensitive data. This integration, which provides fresh perspectives while following strict privacy guidelines, is a turning…

Decoding Cybercriminals’ Motives for Crafting Fake Data Leaks

  Companies worldwide are facing an increasingly daunting challenge posed by data leaks, particularly due to the rise in ransomware and sophisticated cyberattacks. This predicament is further complicated by the emergence of fabricated data leaks. Instead of genuine breaches, threat…

Monti Ransomware Strikes Government Systems Again

The notorious Monti ransomware has made an ominous comeback and is now targeting government organizations. Recent reports from cybersecurity professionals indicate that this malware version has reappeared with a new and powerful encryptor, specifically targeting Linux-powered devices. The cybersecurity community…

Infostealer Malware Exposes Over 100K Accounts From Hacking Forums

  Security experts identified over 140,000 compromised passwords linked to accounts on hacker forums after their owners were infected with data-stealing malware. Hudson Rock searched its cybercrime intelligence database for infected computers with credentials connected with the top 100 cybercrime…

Scammers Exploit Kids with Fake Fortnite and Roblox Offers

Children are increasingly the targets of sophisticated internet fraud in an era where digital connections predominate. Recent studies point to a concerning pattern where con artists leverage children’s love of well-known video games like Fortnite and Roblox to commit marketing…

IBM MOVEit Hack Exposes Data of 4 Million US Citizens

  Millions of Americans had their private medical and health information stolen after attackers hacked into systems operated by tech giant IBM and exploited a zero-day flaw in the widely used MOVEit file transfer software.  The MOVEit major hacks exposed…

Preserving Consumer Trust Through Data Privacy

Data privacy emerges as a crucial cornerstone in preserving consumer trust in today’s digitally driven environment when connected devices and seamless online experiences have become the standard. As data-driven technologies proliferate quickly, strict security controls are required to protect sensitive…

Avada Theme and Plugin Witnesses Critical Vulnerabilities

Several vulnerabilities have been discovered in the popular Avada theme and its companion Avada Builder plugin by security researcher Rafie Muhammad from Patchstack, who revealed that many WordPress websites are vulnerable to these flaws.  Avada Theme and Plugin Avada theme…

Five Reasons Why Network Security Is Paramount

  Governments, organisations, and individuals who own computers all require exceptional network security.What is it exactly? It’s a preventative strategy to keep your network and data safe from malware, unauthorised users, and other risks.  Numerous hardware components and tools, including…

Defend Against Phishing with Multi-Factor Authentication

  Phishing has been a favored attack vector for threat actors for nearly three decades, and its utilization persists until it loses its effectiveness. The success of phishing largely hinges on exploiting the weakest link in an organization’s cybersecurity chain—human…

Security Concerns Surrounding Microsoft OneDrive for Businesses

Microsoft OneDrive has undoubtedly revolutionized the way businesses store and access their data, offering a convenient cloud storage solution. However, recent developments suggest that this widely used platform could inadvertently become a significant security threat to businesses, potentially compromising sensitive…

Operation Jackal: INTERPOL Shuts Down African Cybercrime Gang

A recent operation by INTERPOL on the West African cybercrime organization led to several bank accounts being frozen, with suspects detained and a series of financial investigations organized worldwide.  Operation Jackal, conducted between May 15 and 29, apparently mobilized police…

Defending Against Stealer Log Cyber Threats

Cyber attacks are a serious concern in a digital environment that is becoming more linked. Silent cyber threats have become more common among the many different types of cyberattacks because of their covert nature and potentially disastrous outcomes. The stealer…