Aqua Security researchers have raised concerns about a newly identified malware family that targets Linux-based machines in order to get persistent access and control resources for crypto mining. The malware, known as perfctl, purports to exploit over 20,000 different…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Understanding and Combating Insider Threats in the Digital Age
Insider threats have emerged as a particularly insidious and costly problem. Organizations are experiencing a significant surge in cyberattacks originating from insider threats, with remediation costs soaring up to $2 million per incident. Gurucul’s research, which involved a survey of…
Comcast Data Breach: Over 237,000 Customers’ Information Stolen in Cyberattack on Debt Collector
Comcast has confirmed that sensitive data on 237,703 of its customers was stolen in a cyberattack on Financial Business and Consumer Solutions (FBCS), a debt collection agency it previously worked with. The breach, which occurred in February 2024, involved…
Security Breach Exposes U.S. Wiretap Systems to China-Linked Hackers
A report in The Wall Street Journal on Saturday reported that Chinese hackers broke into the network of a major U.S. broadband service provider and obtained information about the wiretapping system being used by the federal government, according to…
Healthcare Cybersecurity: Taking a Proactive Route
Cyberattacks in healthcare are growing more common and can disrupt an organization’s operations. Healthcare organisations handle a lot of sensitive data, including financial information, patient health records, and identifying data, making them prime targets for cybercriminals. This vulnerability is…
Google’s Latest Theft Protection for Android Devices
Google is introducing new high-level theft protection features for Android 10 and above devices across Google Play services. The new technologies were announced at the I/O 2024 event, with the main idea being to protect users’ data and make…
DoT Introduces New System to Block Spoofed Calls
There has been an increase in fraudulent telephone calls disguised as local numbers in recent years which has alarmed Indian citizens. Messages sent by cybercriminals operating internationally originate from Calling Line Identity (CLI) systems that allow them to mask…
Encryption Battle: FBI’s Year-Long Struggle with Mayor’s Cellphone
Recently, there’s been some buzz around New York City Mayor Eric Adams and his cellphone. Federal investigators seized his phone almost a year ago during a corruption investigation, but they can’t unlock it. Adams says he forgot his phone password,…
India Disconnects 1.77 Crore Mobile Connections Using AI Tools, Blocks 45 Lakh Spoofed Calls
The Indian government has disconnected over 1.77 crore mobile connections registered with fake or forged documents using AI-powered tools, according to a recent announcement by the Department of Telecommunications (DoT). The AI-based system has identified and blocked 45 lakh…
Hackers Exploit Visual Studio Code as a Remote Access Tool, Researchers Find
In a new wave of cyberattacks, hackers are using Microsoft’s Visual Studio Code (VSCode) as a remote access tool to gain unauthorized entry into computers, according to Cyble Research and Intelligence Labs. Visual Studio, a popular integrated development environment…
Massive Global Fraud Campaign Exploits Fake Trading Apps on Apple and Google Platforms
A recent investigation by Group-IB revealed a large-scale fraud operation involving fake trading apps on the Apple App Store and Google Play Store, as well as phishing sites to deceive victims. The scheme is part of a wider investment…
MC2 Data Breach Exposes Millions: Stay Protected
Cybernews reported on September 23 that background check company MC2 Data suffered a major data breach, exposing 2.2 terabytes of sensitive information. This breach potentially affects about 100 million Americans, raising serious concerns among cybersecurity experts about the risks…
Cryptomining and Proxyjacking: The Rise of Perfctl Malware
A new and highly sophisticated malware strain has emerged, posing a significant threat to millions of Linux servers worldwide. Dubbed “perfctl,” this fileless malware employs advanced evasion techniques and exploits a staggering 20,000 misconfigurations in Linux servers. Its primary targets…
New FakeUpdate Cyber Campaign Spreads Updated WarmCookie Backdoor in France
A new wave of cyberattacks is targeting users in France, exploiting fake browser and software update prompts to spread an updated version of the WarmCookie backdoor. The campaign, dubbed “FakeUpdate,” has been linked to the SocGolish threat group, known for…
MoneyGram: No Proof Ransomware Was Behind The Recent Cyber Attack
MoneyGram, a payment provider, claims there is no proof that ransomware was behind a recent incident that caused a five-day outage in September. MoneyGram is an American payment and money transfer platform that allows customers to send and receive…
Harvard Student Uses Meta Ray-Ban 2 Glasses and AI for Real-Time Data Scraping
A recent demonstration by Harvard student AnhPhu Nguyen using Meta Ray-Ban 2 smart glasses has revealed the alarming potential for privacy invasion through advanced AI-powered facial recognition technology. Nguyen’s experiment involved using these $379 smart glasses, equipped with a livestreaming…
CosmicSting Exploit Targets Adobe Commerce and Magento Stores
In the summer of 2013, cybercriminals gained access to 5% of all Adobe Commerce and Magento stores worldwide. Large international brands have fallen victim to this attack and are among the victims. The CosmicSting attack is being conducted by…
Indian Textile Tycoon Duped of ₹7 Crore in Elaborate ‘Digital Arrest’ Scam
In a shocking incident, SP Oswal, chairman of the Vardhman Group, India, fell victim to a scam that cost him over INR 7 crore. The 82-year-old businessman was tricked into believing he was under investigation for money laundering, with…
How to Protect Your PC from Ransomware with Windows Defender
Ransomware is a significant threat that can lock users out of their own files until a ransom is paid to recover the data. CBS News recently highlighted the devastating impact of ransomware, focusing on the Scattered Spider group, which…
Global Governments Address Ransomware Threat with New Guidelines
In response to the recent publication of the Counter Ransomware Initiative (CRI), members of the initiative have provided new guidance to organizations so they can consider other possibilities before paying cyber criminals a ransom. The new guidelines aim to…