Tag: CySecurity News – Latest Information Security and Hacking Incidents

DCRat Malware Propagates via HTML Smuggling

  Russian-speaking customers have been targeted in a new campaign aimed at distributing a commodity trojan known as DCRat (aka DarkCrystal RAT) using HTML smuggling.  This is the first time the malware has been propagated via this technique, which differs…

Ransomware Gangs Targeting CEOs with Stolen Data

Ransomware gangs are now employing a terrifying tactic—using stolen data to coerce and threaten CEOs.  Understanding Ransomware Attacks Ransomware is a type of malicious software that encrypts the victim’s data, rendering it inaccessible until a ransom is paid. Over the…

Embargo Ransomware Shifts Focus to Cloud Platforms

  In a recent security advisory, Microsoft advised that the ransomware threat actor Storm-0501 has recently switched tactics, targeting hybrid cloud environments now to compromise the entire system of victimization. It is becoming increasingly apparent that cybercriminals are finding out…

Why SMBs Have Become Easy Prey for Cyber Criminals

  The global phenomenon of cybercrime is emerging. And the soft targets in this regard are the small and medium-sized business enterprises. Day after day, while a few cyberattacks on big corporations capture the headlines in the news, many SMBs…

Growing Focus on Data Privacy Among GenAI Professionals in 2024

  Recent reports published by Deloitte and Deloitte Consulting, highlighting the significance of data privacy as it pertains to Generative Artificial Intelligence (GenAI), have been widely cited. As the survey found, there has been a significant increase in professionals’ concerns…

Homeland Security Alerts on Increasing Risks for Schools

  Educators and other school professionals are playing an increasingly crucial role in providing a safe environment in which students can learn in an era where children are being targeted by increasing physical and online attacks, according to US Homeland…

Mozilla Privacy: Tracking Users Without Consent

The organization behind the privacy-centric Firefox browser, has come under fire for allegedly tracking users without their consent. This controversy centers around a feature called Privacy Preserving Attribution (PPA), which has sparked a heated debate about privacy, consent, and the…

Ethics and Tech: Data Privacy Concerns Around Generative AI

The tech industry is embracing Generative AI, but the conversation around data privacy has become increasingly important. The recent “State of Ethics and Trust in Technology” report by Deloitte highlights the pressing ethical considerations that accompany the rapid adoption of…

Microsoft Tightens Cloud Security After Major Breaches

  In its efforts to better its cloud security, Microsoft has done much to remove any potential vulnerabilities and tightened the process of authenticating individuals. This comes after the tech giant saw several security breaches within the past year. Under…

AI-Generated Malware Discovered in the Wild

  Researchers found malicious code that they suspect was developed with the aid of generative artificial intelligence services to deploy the AsyncRAT malware in an email campaign that was directed towards French users.  While threat actors have employed generative AI…

MoneyGram Faces Service Disruption Amid Cybersecurity Threat

  A cyberattack that began on September 20 impacted MoneyGram International Inc.’s services significantly, likely due to a ransomware attack, causing significant disruptions to its services. There were reports of outages affecting company networks, and by September 23, the company…

Here’s Why UltraAV Replaced Kaspersky Antivirus Software

  Late last week, cybersecurity firm Kaspersky began deleting its anti-malware software from PCs in the United States. As a replacement, the company downloaded antivirus software from UltraAV.  If you use Kaspersky antivirus software, you may be aware that the…

Doxing: Is Your Personal Information at Risk?

  Doxing is the online slang for “dropping documents,” which means revealing private information about a person or his identity to the public without his permission. It may be as simple as a person’s name, e-mail, or phone number, but…

Why Hackers Are Collecting Encrypted Data for Future Attacks

  The cybercrime world is ever-changing, and hackers are preparing for a future quantum computer that might make current encryption techniques useless. This is called “harvest now, decrypt later,” a rising phenomenon since cybercriminals steal encrypted data with hope for…

Microsoft Issues New Warnings For Windows Users

  As we approach the weekend, a new warning has been issued that a “global attack” is now targeting Windows users in multiple nations worldwide. The campaign is surprisingly basic, but it highlights the risk for the hundreds of millions…

IntelBroker Leak Claims Involve Deloitte Communications

  An anonymous threat actor named IntelBroker claimed to be responsible for the leak of internal messaging from Deloitte, one of the world’s leading auditing firms. According to reports, the breach occurred in September 2024 when an Apache Solr server…

Specops Unearths Millions of Compromised VPN Passwords

  The moment a password is discovered, a virtual private network (VPN) becomes public quickly. In a report published last week, password management provider Specops Software revealed 2,151,523 VPN credentials exposed by malware over the past year. One professional at…

Malvertising and Cybercrime in Online Advertising

  When it comes to cyber threats, judging the threat by its name can be an imaginary endeavour. As the term “malvertising”, a portmanteau of the term “malicious advertising”, is always presented with the implication that it overlaps with ads,…

Nearly Half of Security Experts Believe AI is Risky

  AI is viewed by 48% of security experts as a major security threat to their organisation, according to a new HackerOne security research platform survey of 500 security professionals.  Their main worries about AI include the following:  Leaked training…

AI Development Needs Global Oversight, UN Experts State

  In a time of increasing popularity for artificial intelligence (AI), the United Nations has warned that market forces should not be the sole determining factor as the technology becomes more widely used. United Nations experts called for creating tools…

Lumma Stealer Uses Fake CAPTCHA Pages to Distribute Malware

Cyber security professionals are warning about a new cyber-attack vector: Lumma Stealer malware that uses fake CAPTCHA tests to spread malware on Windows devices. Users are advised to maintain caution when filling out a CAPTCHA challenge.  “We have identified more…

Seattle Port Suffers Data Breach, Rhysida Ransomware Suspected

  The ransomware attack has significantly disrupted the port’s operations, highlighting the challenges that critical infrastructure providers face in the immediate aftermath of a cybersecurity breach. While recovery efforts are ongoing, the impact continues for some areas. Most affected systems…

Red Hat OpenShift Users Urged to Patch Critical Build Flaws

  Over 3,000 of Red Hat OpenShift’s customers, including a significant portion of the Global Fortune 500, are trusting the platform because of its robust security features and its industry-leading hybrid cloud platform. However, two critical vulnerabilities in OpenShift could…

UK Leads Global Cybersecurity Dialogue

  As part of a three-day meeting with ‘like-minded’ countries, the UK has begun a conversation aimed at tackling the growing threat of cyber attacks and how to combat them. The government intends to initiate a global dialogue with leading…

Here’s How to Remove Malware From Your Chromebook

  Imagine this: your Chromebook fails just before you click “Save” after spending hours working on your project. Let’s imagine you want to watch a series, but it keeps crashing, making it impossible for you to get the most out…

Kawasaki Motors Europe Targeted by RansomHub Ransomware Attack

  Kawasaki Motors Europe has been targeted by a ransomware attack orchestrated by the RansomHub gang, causing significant disruption to its services. The company, responsible for distributing and selling Kawasaki’s motorcycles across Europe, swiftly responded by isolating its servers to…

E-commerce Threat: The WooCommerce Skimming Attacks

The cybersecurity landscape advances daily and so do threats, e-commerce websites have become a main target for threat actors. In a recent incident, an advanced skimming attack on WooCommerce sites has shed light on the new methods hackers use to…

Port of Seattle Battles Ransomware Attack, Refuses to Pay

  The Port of Seattle and Seattle-Tacoma International Airport have corroborated that the major system outages which took place late August were caused by a ransomware attack. On August 24, a cyberattack partially disrupted the critical operations at the airport…

Rhysida Ransomware Hits Seattle Port in August Attack

  As part of its investigation, the Port of Seattle, which operates Seattle-Tacoma International Airport in the city, has determined that the Rhysida ransomware gang is responsible for the cyberattack that allowed it to reach its systems last month, causing…

North Korean Hackers Attacking Crypto Industry, Billions at Risk

The United States Federal Bureau of Investigation (FBI) has recently highlighted a significant cybersecurity threat posed by North Korean cybercriminals targeting the web3 and cryptocurrency sectors.  Why Hackers Target ETFs? The cryptocurrency industry has witnessed tremendous growth, Ether and Bitcoin…

RansomHub Ransomware: Exploiting Trusted Tools to Evade Detection

Ransomware groups continue to innovate and adapt their tactics to bypass security measures. One such group, RansomHub, reported by Malwarebytes, has recently garnered attention for its sophisticated approach to disabling Endpoint Detection and Response (EDR) systems. By leveraging Kaspersky’s TDSSKiller,…

NoName Hackers Use RansomHub in Recent Cyber Campaigns

  Despite active attacks by gangs such as the NoName ransomware group, which has targeted small and medium-sized businesses worldwide for the past three years, the group has continued to grow by using custom malware and evolving its attack methods.…