The infamous Clop Ransomware gang has once again made headlines by successfully breaching the servers of Cleo, a well-known provider of file transfer software. The cybercriminal group is now threatening to leak sensitive data from Cleo’s extensive client base unless…
Category: EN
A ransomware attack disrupted services at Pittsburgh Regional Transit
A ransomware attack on Pittsburgh Regional Transit (PRT) was the root cause of the agency’s service disruptions. On December 23, 2024, Pittsburgh Regional Transit (PRT) announced it was actively responding to a ransomware attack that was first detected on Thursday,…
Brazilian Hacker Charged for Extorting $3.2M in Bitcoin After Breaching 300,000 Accounts
A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company’s network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts…
Top Cybersecurity Compliance Issues Businesses Face Today
As organizations increasingly rely on digital infrastructure, the stakes have never been higher. Cybersecurity compliance is necessary to safeguard sensitive data, maintain customer trust, and avoid costly fines. With a constantly shifting threat landscape, evolving regulations, and the rise of…
Ruijie Networks’ Cloud Platform Flaws Could’ve Exposed 50,000 Devices to Remote Attacks
Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. “These vulnerabilities affect both the Reyee platform, as well as Reyee OS…
These were the badly handled data breaches of 2024
Blaming victims, months of silence, and suing security researchers all featured in cybersecurity in 2024. © 2024 TechCrunch. All rights reserved. For personal use only. This article has been indexed from Security News | TechCrunch Read the original article: These…
Securing Remote OT Operations:
Expanded attack surfaces have made OT systems a target for cyber threats, underscoring the need for a security framework tailored to remote OT environments. The post Securing Remote OT Operations: appeared first on Palo Alto Networks Blog. This article has…
The Intersection of AI and OSINT: Advanced Threats On The Horizon
Artificial Intelligence (A) is revolutionizing intelligence gathering, empowering cybersecurity defenders, and amplifying threat actor capabilities. The post The Intersection of AI and OSINT: Advanced Threats On The Horizon appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read…
Defense Giant General Dynamics Says Employees Targeted in Phishing Attack
General Dynamics says several benefits accounts were hacked after threat actors targeted employees in a phishing campaign. The post Defense Giant General Dynamics Says Employees Targeted in Phishing Attack appeared first on SecurityWeek. This article has been indexed from SecurityWeek…
Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner
Threat Analysts have reported alarming findings about the “Araneida Scanner,” a malicious tool allegedly based on a cracked version of Acunetix, a renowned web application vulnerability scanner. The tool has been linked to illegal activities, including offensive reconnaissance, scraping user…
Cl0p Ransomware Group to Name Over 60 Victims of Cleo Attack
The Cl0p ransomware group has confirmed that Blue Yonder was hit in the Cleo attack and the hackers are preparing to name over 60 others. The post Cl0p Ransomware Group to Name Over 60 Victims of Cleo Attack appeared first…
Top Cyber Asset Attack Surface Management (CAASM) Tools for 2024
In today’s dynamic cybersecurity landscape, organizations face an ever-evolving threat environment where new vulnerabilities are continuously discovered, and attack surfaces expand with the increasing digitalization of business processes. This is where (CAASM) Cyber Asset Attack Surface Management tools come into…
Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass
iProov uncovers a major Dark Web operation selling stolen identities with matching biometrics, posing a serious threat to KYC verification systems This article has been indexed from Hackread – Latest Cybersecurity, Tech, Crypto & Hacking News Read the original article:…
Japan Airlines Was Hit by a Cyberattack, Delaying Flights During the Year-End Holiday Season
Japan Airlines was hit by a cyberattack, causing delays to more than 20 domestic flights, but there was no threat to flight safety. The post Japan Airlines Was Hit by a Cyberattack, Delaying Flights During the Year-End Holiday Season appeared…
Infostealers Dominate as Lumma Stealer Detections Soar by Almost 400%
The vacuum left by RedLine’s takedown will likely lead to a bump in the activity of other a infostealers This article has been indexed from www.infosecurity-magazine.com Read the original article: Infostealers Dominate as Lumma Stealer Detections Soar by Almost 400%
A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves the systematic collection and exploitation of genuine identity documents and images. Attackers utilize these resources to develop and sell techniques for bypassing identity verification systems,…
The Worst Hacks of 2024
From Chinese cyberspies breaching US telecoms to ruthless ransomware gangs disrupting health care for millions of people, 2024 saw some of the worst hacks, breaches, and data leaks ever. This article has been indexed from Security Latest Read the original…
A cyber attack hit Japan Airlines delaying ticket sales for flights
A cyberattack hit Japan Airlines (JAL), causing the suspension of ticket sales for flights departing on Thursday. A cyber attack hit Japan Airlines (JAL) on Thursday, the offensive began at 7:24 a.m. and impacted internal and external systems. The Associated…
PlugX worm disinfection campaign feedbacks
In September 2023, we successfully took ownership of one of the IP addresses used by the PlugX worm—a variant of PlugX associated with Mustang Panda, which possesses worming capabilities by infecting flash drives. Following this success, we studied the inner…
McDonald’s Delivery App Bug Let Customers Orders For Just $0.01
McDonald’s India (West & South) / Hardcastle Restaurants Pvt. Ltd. operates a custom McDelivery web app for ordering McDonald’s food for delivery, dine-in, and takeout. The app is popular, with over 10 million downloads on Google Play and #16 in…