Healthcare organizations have experienced a significant transformation, transitioning from paper-based records to digital systems. This change enables medical records to be accessed and updated anytime, improving coordination among hospitals, clinics, and specialists. Despite the advantages, digital storage poses significant challenges,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Here’s Why You Need A New App After Google RCS Issue
Google Messages has suddenly gone haywire. After years of campaigning, the “seamless messaging” dream was finally realised, but it vanished as quickly as it arrived. Currently, the question is whether it has any prospect of ever returning. Like a…
Operation Digital Eye Reveals Cybersecurity Breach
It has been recently reported that a Chinese group of Advanced Persistent Threats (APTs) has carried out a sophisticated cyberespionage operation dubbed “Operation Digital Eye” against the United States. Between the end of June and the middle of July…
Brain Cipher Ransomware Group Claims Deloitte UK Data Breach
Brain Cipher, a ransomware group that emerged in June 2024, has claimed responsibility for breaching Deloitte UK, alleging the exfiltration of over 1 terabyte of sensitive data from the global professional services firm. This claim has raised significant concerns…
BT Group Confirms Cyberattack by Black Basta Ransomware Group
British telecommunications giant BT Group has confirmed it was targeted by the notorious ransomware group Black Basta in a cyberattack on its Conferencing division. The breach forced BT to isolate and shut down parts of its infrastructure to limit the…
New Malware Campaign Attacks Manufacturing Industry
Lumma Stealer and Amaday Bot Resurface In a recent multi-stage cyberattack, Cyble Research and Intelligence (CRIL) found an attack campaign hitting the manufacturing industry. The campaign depends upon process injection techniques aimed at delivering malicious payloads like Amaday Bot and…
Microsoft Challenges Hackers with $10,000 AI Cybersecurity Contest
Microsoft has unveiled a groundbreaking cybersecurity challenge aimed at advancing the security of artificial intelligence (AI) systems. Named the “LLMail-Inject: Adaptive Prompt Injection Challenge,” the initiative invites hackers and security researchers to test their skills against a…
Romania Annuls Elections After TikTok Campaign and Cyberattacks Linked to Russia
Romania’s Constitutional Court (CCR) has annulled the first round of its recent presidential elections after intelligence reports revealed extensive foreign interference. Cyberattacks and influence campaigns have raised serious concerns, prompting authorities to reschedule elections while addressing security vulnerabilities. …
Black Basta Ransomware: New Tactics and Growing Threats
The Black Basta ransomware group, an offshoot of the now-defunct Conti group, has adapted its attack strategies by integrating sophisticated social engineering techniques. Recent trends include email bombing, malicious QR codes, and credential theft, showcasing the group’s commitment to…
Novel iVerify Tool Detects Widespread Use of Pegasus Spyware
iVerify’s mobile device security tool, launched in May, has identified seven cases of Pegasus spyware in its first 2,500 scans. This milestone brings spyware detection closer to everyday users, underscoring the escalating threat of commercial spyware. How the Tool…
China’s Surveillance System: Cracks in a Digital Panopticon
China’s expansive surveillance network monitors over 1.4 billion citizens, blending advanced technology with minimal legal checks on state control. However, cracks are emerging in this highly complex system. Overview of Surveillance China’s surveillance infrastructure leverages technologies such as:…
Electrica Group Under Cyber Attack, Systems Secure
Romanian energy provider Electrica Group has confirmed a cyber attack on its systems. Despite the breach, the company assured customers that its critical infrastructure remains secure. Incident Overview Electrica revealed that emergency response protocols were activated in line…
Employee Cybersecurity Habits Are Increasing Organizational Risk: Survey
A recent survey involving over 14,000 employees across various industries has unveiled troubling trends in employee behavior that pose significant risks to organizational data security. The findings highlight common yet dangerous practices related to sensitive data management. Key…
Hackers Exploit Cloudflare Tunnels and DNS Fast-Flux to Conceal GammaDrop Malware
A notorious threat actor known as Gamaredon has been observed employing Cloudflare Tunnels to hide its malware staging infrastructure, facilitating the deployment of GammaDrop malware. This technique is part of a spear-phishing campaign actively targeting Ukrainian organizations since early 2024. …
U.S. Officials Sound Alarm Over Salt Typhoon Hack as Cybersecurity Becomes Political Flashpoint
U.S. Officials Urge Encryption Adoption Amid “Salt Typhoon” Cyberattack In an unprecedented response to the “Salt Typhoon” cyber intrusion, top cybersecurity and law enforcement officials in the U.S. are urging citizens to adopt encrypted messaging platforms. The attack, attributed…
Vodka Maker Stoli Files for Bankruptcy in US Following Ransomware Assault
Stoli Group’s U.S. Subsidiaries File for Bankruptcy Amid Ransomware Attack and Russian Asset Seizure The U.S. subsidiaries of Stoli Group have declared bankruptcy following an August ransomware attack and the confiscation of the company’s last distilleries in Russia by…
Telecom Networks on Alert Amid Cyberespionage Concerns
US Federal Government Urges Telecom Firms to Bolster Security Amid Chinese Hacking Allegations The U.S. Federal Government has called on telecommunication companies to strengthen their network security in response to a significant hacking campaign allegedly orchestrated by Chinese state-sponsored…
Meeten Malware Targets Web3 Workers with Crypto-Stealing Tactics
Sophisticated Malware Campaign Targets Web3 Professionals Through Fake Meeting Software Cybercriminals have launched an advanced campaign targeting Web3 professionals by distributing fake video conferencing software. The malware, known as Meeten, infects both Windows and macOS systems, stealing sensitive data,…
FTC Stops Data Brokers from Unlawful User Location Tracking
Data Brokers Accused of Illegal User Tracking < p style=”text-align: justify;”>The US Federal Trade Commission (FTC) has filed actions against two US-based data brokers for allegedly engaging in illegal tracking of users’ location data. The data was reportedly used to…
Database Service Provider Leak Results in Exposing Over 600,000 Records on Web
< p style=”text-align: justify;”>SL Data Services, a U.S.-based data broker, experienced a massive data breach, exposing 644,869 personal PDF files on the web. The leaked records included sensitive information such as personal details, vehicle records, property ownership documents, background checks,…