It has been espoused in the generative AI phenomenon that the technology’s key uses would include providing personalized shopping experiences for customers and creating content. Nonetheless, generative AI can also be seen to be having a very real impact…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Gmail Alert: Massive Phishing Campaign Spreads Rhadamanthys Malware
Cybersecurity experts have issued a new warning about a large-scale phishing attack targeting Gmail users worldwide. Researchers at Check Point have uncovered the threat, which uses fake Gmail accounts to send emails impersonating well-known companies. These fraudulent messages claim…
Phishing Scams use Microsoft Visio Files to Steal Information
The latest phishing attacks involve users being victimised in private information scams through the use of Microsoft Visio files. According to a security firm called Perception Point, the trick mainly involves using the .vsdx file extension, used for business…
Hot Topic Data Breach Exposes Private Data of 57 Million Users
Have I Been Pwned warns that an alleged data breach compromised the private data of 56,904,909 Hot Topic, Box Lunch, and Torrid users. Hot Topic is an American retail franchise that specialises in counterculture-themed clothes, accessories, and licensed music…
Addressing AI Risks: Best Practices for Proactive Crisis Management
An essential element of effective crisis management is preparing for both visible and hidden risks. A recent report by Riskonnect, a risk management software provider, warns that companies often overlook the potential threats associated with AI. Although AI offers…
Volt Typhoon rebuilds malware botnet following FBI disruption
There has recently been a rise in the botnet activity created by the Chinese threat group Volt Typhoon, which leverages similar techniques and infrastructure as those previously created by the group. SecurityScorecard reports that the botnet has recently made…
New TSA Rules to Boost Cybersecurity in Transport
The Transportation Security Administration recently unveiled a proposed rule that would permanently codify cybersecurity reporting requirements in certain segments of U.S. transportation, including pipelines and railroads. This change is set to be permanent after the agency introduced temporary reporting requirements…
Chrome Extensions Continue to Pose a Threat, Even With Google’s Manifest V3
Users have always found browser extensions to be a useful tool for increasing productivity and streamlining tasks. They have, however, become a prime target for malicious actors attempting to exploit flaws, impacting both individual users and companies. Despite efforts…
Texas Oilfield Supplier Operations Impacted by Ransomware Incident
About two months before the Newpark Resources attack, oilfield services giant Halliburton had been afflicted with a cyberattack that it then disclosed in a regulatory filing, which occurred about two months earlier. Last week, Halliburton, the world’s largest energy…
WHO and Global Leaders Warn Against Rise of Ransomware Attacks Targeting Hospitals
On November 8, the World Health Organization (WHO) joined over 50 countries in issuing an urgent warning at the United Nations about the increase in ransomware attacks on healthcare systems worldwide. WHO Director-General Tedros Adhanom Ghebreyesus addressed the UN…
Critical Security Flaw in SEIKO EPSON Devices Allows Unauthorized Access
A recent security vulnerability identified as CVE-2024-47295 poses a serious risk for several SEIKO EPSON devices, potentially granting attackers administrative control. This vulnerability stems from a weak initial password setup within SEIKO EPSON’s Web Config software, which manages network…
North Korean Hackers Employ macOS Malware to Target Crypto Firms
BlueNoroff, a North Korean threat actor, has been attacking crypto firms with a new multistage malware for macOS systems. According to the researchers, the campaign is known as Hidden Risk, and it lures victims with emails that include fake…
Global Companies Targeted by “CopyR(ight)hadamantys” Phishing Scam Using Advanced Infostealer Malware
Hundreds of organizations worldwide have recently fallen victim to a sophisticated spear-phishing campaign, where emails falsely claiming copyright infringement are used to deliver an advanced infostealer malware. Since July, Check Point Research has tracked the distribution of these emails…
Supreme Court Weighs Shareholder Lawsuit Against Meta Over Data Disclosure
The U.S. Supreme Court is deliberating on a high-stakes shareholder lawsuit involving Meta (formerly Facebook), where investors claim the tech giant misled them by omitting crucial data breach information from its risk disclosures. The case, Facebook v. Amalgamated Bank,…
Browser Warning: Fake Websites Steal Millions from Users
Cyber scammers give new warnings as they do not stop scamming unsuspecting web shoppers through a new phishing campaign posing to be online stores. Many of these fake stores Google has removed from its search results, but links remain…
Veeam RCE Bug Now a Target for Frag Ransomware Operators
Recently, a critical VBR (Veeam Backup & Replication) security flaw was exploited by cyber thieves to distribute Frag ransomware along with the Akira and Fog ransomware attacks. Florian Hauser, a security researcher with Code White, has discovered that the…
600 Million Daily Cyberattacks: Microsoft Warns of Escalating Risks in 2024
Microsoft emphasized in its 2024 annual Digital Defense report that the cyber threat landscape remains both “dangerous and complex,” posing significant risks to organizations, users, and devices worldwide. The Expanding Threat Landscape Every day, Microsoft’s customers endure more than 600…
Hacker Claims to Publish Nokia Source Code
The Finnish telecoms equipment firm Nokia is looking into the suspected release of source code material on a criminal hacking site. See also: Gartner Market Guide for DFIR Retainer Services. An attacker going by the handle “IntelBroker,” who is…
Cyberattack Impacts Georgia Hospital, Colorado Pathology Services
The number of hospitals that have been affected by ransomware, business email compromise, and other cyber threats is increasing across all sectors, from small community hospitals such as Memorial Hospital and Manor in Bainbridge, Georgia, to those with a…
How to Prevent a Ransomware Attack and Secure Your Business
In today’s world, the threat of cyberattacks is an ever-present concern for businesses of all sizes. The scenario of receiving a call at 4 a.m. informing you that your company has been hit by a ransomware attack is no…