The Play ransomware group has claimed responsibility for last week’s cyberattack on the American semiconductor company Microchip Technology. On Tuesday, the group added Microchip Technology to its data leak site, as noted by multiple cybersecurity researchers. Play is notorious…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Fota Wildlife Park Issues Urgent Warning After Website Cyberattack
Fota Wildlife Park in East Cork has issued an urgent warning following a major cyberattack on its website, potentially compromising thousands of customers’ personal and financial details. The park advises those who made transactions on its website between May…
Emailing in Different Languages Just Got Easier— This AI Will Amaze You
Proton, a company known for its commitment to privacy, has announced a paradigm altering update to its AI-powered email assistant, Proton Scribe. The tool, which helps users draft and proofread emails, is now available in eight additional languages: French,…
Three Cyber Extortion Schemes Attackers Can Employ Against You
Cybercriminals appear to have an infinite repertoire of strategies at their disposal when it comes to forcefully extracting financial information from victims. They prefer specific methods over others, and extortion is one of them. Keep in mind that blackmailers…
Esso Corporate Fleet Programme Hit by Ransomware Attack on Abecha Servers
A ransomware attack on Abecha, the company managing Singapore’s Esso Corporate Fleet Discount Programme, may have compromised sensitive credit card information of its customers. Abecha discovered the breach on August 13 and notified affected customers on August 28. According…
Security Alert for Gmail, Facebook, and Amazon Users
The number of hacks that occur on Google, Gmail, and Amazon accounts keeps on rising, causing users to become anxious. By using phishing tactics, hackers are targeting users’ passwords for Gmail, Facebook, and Amazon through phishing campaigns that pose…
New Version of Snake Keylogger Targets Victims Through Phishing Emails
Researchers at Fortinet’s FortiGuard Labs have uncovered a newly evolved variant of the Snake Keylogger, a type of malicious software notorious for capturing and recording everything a user types. Keyloggers are often used by cybercriminals to steal personal information, such…
Introducing the “World’s Most Private VPN” – Now Open for Testers
Virtual Private Network (VPN) is a security tool that encrypts your internet connection and disguises your IP address. This is achieved by rerouting your data through an encrypted tunnel to one of the VPN’s servers. While the technical details…
The Corona Mirai Botnet: Exploiting End-of-Life IP Cameras
A recent report by Akami experts highlights a troubling trend: the exploitation of a five-year-old zero-day vulnerability in end-of-life IP cameras by the Corona Mirai-based malware botnet. This blog delves into the details of this issue, its implications, and the…
AT&T Claims It Has Fixed Software Bug That Caused An Outage For Some Wireless Users
Some AT&T customers experienced a disruption in their wireless service earlier this week, which made it difficult for them to call 911 in an emergency. It was rectified in a few hours, with the company blaming a software fault,…
Massive Data Breach Exposes Sensitive Information Linked to ServiceBridge Platform
A recent data breach involving the ServiceBridge platform, used for field service management, has exposed sensitive data belonging to millions of customers and businesses. Security researcher Jeremiah Fowler discovered that nearly 32 million files were left unprotected and accessible…
Hacker Who Took Down North Korea’s Internet Reveals Key Insight
Alejandro Caceres, known online as P4x, recently revealed himself as the hacker who managed to take down North Korea’s internet for over a week. This feat, conducted entirely from his home in Florida, has drawn significant attention, and Caceres…
Espionage Concerns Arise from Newly Discovered Voldemort Malware
As a result of Proofpoint researchers’ research, in August 2024, they discovered an unusual campaign in which custom malware was being delivered by a novel attack chain. Cybercriminals are believed to have named the malware “Voldemort” based on the…
Three Major Issues Family Offices Face With Private Market Data
Simply accumulating more data in a family office does not directly translate into better decision-making. Without the necessary tools and mechanisms in place to process this information, it might have the opposite effect. It’s no secret that many family…
Choosing the Right Browser: Privacy Tips from Apple and Google
Apple has launched an ad campaign urging over a billion iPhone users to stop using Google Chrome, citing privacy concerns. This campaign has sparked a heated debate between two tech giants, Apple and Google, over the best way to protect…
Project Strawberry: Advancing AI with Q-learning, A* Algorithms, and Dual-Process Theory
Project Strawberry, initially known as Q*, has quickly become a focal point of excitement and discussion within the AI community. The project aims to revolutionize artificial intelligence by enhancing its self-learning and reasoning capabilities, crucial steps toward achieving Artificial General…
Chinese Hackers Exploit Serious Flaw in Versa SD-WAN Systems
A Chinese cyber-espionage group, known as Volt Typhoon, has been exploiting a newly discovered security flaw in Versa Networks’ SD-WAN Director servers. This zero-day vulnerability, identified as CVE-2024-39717, has already been used to infiltrate several organizations. Given the seriousness…
Bling Libra Shifts Focus to Extortion in Cloud-Based Attacks
It was observed during an incident response engagement handled by Unit 42, that the threat actor group Bling Libra (which was responsible for distributing ShinyHunters ransomware) had shifted from extortion to extortion of victims rather than its traditional tactic…
The Dual Nature of Telegram: From Protest Tool to Platform for Criminal Activity
Telegram, a messaging app co-founded by Pavel Durov in 2013, has become one of the world’s largest communication platforms, with over 900 million users. The app’s dual nature has recently put it in the spotlight after Durov was arrested…
Private Data of 950K Users Stolen in BlackSuit Ransomware Attack
On April 10, 2024, a BlackSuit ransomware assault disclosed 954,177 personally identifiable information, forcing Young Consulting to send out data breach notifications. Young Consulting (formerly Connexure) is an Atlanta-based software solutions provider that specialises in the employer stop-loss marketplace.…