Infostealer malware is becoming one of the most alarming cybersecurity threats, silently stealing sensitive data from individuals and organizations. This type of malware operates stealthily, often going undetected for long periods while extracting valuable information such as login credentials,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Microsoft Warns of Malvertising Campaign Impacting Over 1 Million Devices Worldwide
Microsoft has revealed details of a large-scale malvertising campaign that is believed to have impacted over one million devices worldwide as part of an opportunistic attack aimed at stealing sensitive information. The tech giant, which discovered the activity in…
Huge Spike in Social Media and Email Hacks – Simple Ways to Protect Yourself
There has been a worrying rise in the number of people losing control of their social media and email accounts this year. According to recent data from Action Fraud, the UK’s national cybercrime reporting center, over 35,000 cases were…
Chinese APT Volt Typhoon Target U.S. Power Utility in Prolonged Cyberattack
Chinese hackers involved in the Volt Typhoon attack spent over a year inside the networks of a major utility company in Littleton, Massachusetts. In a report published last week, Dragos, an operational technology (OT) cybersecurity firm, described their work…
Deauthentication Attacks Leave Wi-Fi Networks at Risk
A recent report from Nozomi Networks has revealed that the vast majority of Wi-Fi networks are highly vulnerable to deauthentication attacks, a common form of denial-of-service (DoS) attack. After analyzing telemetry from hundreds of operational technology (OT) and internet…
Lazarus Group Intensifies Attacks on South Korean Web Servers
Researchers have uncovered a series of highly sophisticated cyberattacks by the notorious Lazarus group, targeting web servers in South Korea. The attackers have been infiltrating IIS servers to deploy ASP-based web shells, which serve as the first-stage Command and…
Password Reuse Threatens Security of 50 Percent of Online Users
The Overlooked Danger of Password Reuse While digital access is becoming increasingly prevalent in our everyday lives, from managing finances to enjoying online entertainment, there remains a critical security lapse: password reuse. Even though it is convenient, this practice…
Finally, Safer Chats! Apple to Encrypt Messages Between iPhones and Android Phones
Apple is set to make a major improvement in how people using iPhones and Android devices communicate. Soon, text messages exchanged between these two platforms will be protected with end-to-end encryption, offering better privacy and security. For years, secure…
Ransomware Hackers Develop Advanced Tool for VPN Breaches
In the Black Basta ransomware group, an automated brute force attack tool referred to as BRUTED has been developed to target and compromise edge networking devices such as firewalls and VPNs, as well as other edge networking devices. By…
Raymond Cyberattack: IT Teams, Authorities Investigate Massive Breach
Raymond Limited, a leading textile and apparel firm, acknowledged a cyberattack on its IT infrastructure on February 19. The company quickly segregated affected systems to protect essential business operations and avoid disruptions to customer-facing platforms or shop networks. Rakesh…
Ransomware Group Uses Unpatched Webcams to Deploy Attacks
A recent cybersecurity report by S-RM has revealed a new tactic used by the Akira ransomware group, demonstrating their persistence in bypassing security defenses. When their initial attempt to deploy ransomware was blocked by an endpoint detection and response…
Auto Industry Faces Sharp Rise in Cyberattacks, Raising Costs and Risks
The growing use of digital systems in cars, trucks, and mobility services has made the automotive industry a new favorite target for hackers. Companies involved in making vehicles, supplying parts, and even selling them are now dealing with a…
Here’s How to Prevent Outdated Software from Hurting Your Business
Do you think continuing with the same old version of the same old software is a good idea? While it may function adequately for the time being, the clock is ticking towards disaster. Waiting to upgrade results in a…
North Korean Spyware Disguised as Android Apps Found on Google Play
Researchers have discovered at least five Android apps on Google Play that secretly function as spyware for the North Korean government. Despite passing Google Play’s security checks, these apps collect personal data from users without their knowledge. The malware,…
Growing Concerns Over Deceptive Master Password Reset Emails
A network security risk associated with unauthorized password resets is very significant, as it can expose sensitive information and systems to cyber threats. IT administrators must take care to monitor and validate every password reset, particularly those that involve…
New Ransomware ‘SuperBlack’ Abuses Fortinet Firewall Flaws to Launch Attacks
A newly discovered ransomware group known as Mora_001 is carrying out cyberattacks by exploiting security weaknesses found in Fortinet’s firewall systems. The group is using a custom ransomware strain named SuperBlack to target organizations and lock their data for…
Medusa Ransomware Attacks: CISA, FBI, and MS-ISAC Issue #StopRansomware Advisory
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the FBI and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has issued a #StopRansomware advisory, warning organizations about the increasing threat of Medusa ransomware. Medusa, a ransomware-as-a-service (RaaS)…
Microsoft Unearths Novel XCSSET macOS Malware Variant Targeting Xcode Projects
Microsoft Threat Intelligence identified a new strain of XCSSET, a complex modular macOS malware that targets Xcode programs. The malware was discovered in the wild during routine threat hunting, and it is the first known XCSSET variant to appear…
Smishing Scams and How to Strengthen Cybersecurity
There is a growing threat to individuals from spamming, a form of cyber attack derived from SMS phishing, which uses text messaging to deceive them into disclosing sensitive information or engaging with malicious links via text messaging. Though the…
How Web Browsers Have Become a Major Data Security Risk
For years, companies protected sensitive data by securing emails, devices, and internal networks. But work habits have changed. Now, most of the data moves through web browsers. Employees often copy, paste, upload, or transfer information online without realizing the…