Tag: CySecurity News – Latest Information Security and Hacking Incidents

Veeam Software Issues Fixes for Exploitable Security Flaws

  Security experts recommend all Veeam Backup & Replication software customers to upgrade their software immediately to address a critical, remotely exploitable vulnerability. Veeam first revealed the flaw, dubbed CVE-2024-40711, on Thursday, when it issued fixes to address 18 vulnerabilities…

Election Sabotage via Cyberattacks Increases

  Several predictions have pointed out that 2024 will not only be an election year but also a year of civil rights. Security has identified an increasing trend of malicious cyber activity aimed at imperilling sovereign elections around the world…

Hackers Use SonicWall Security Flaw in Ransomware Attacks

  In the latest ransomware attack, operators have started using a critical bug in SonicWall SonicOS firewall devices as an entry point for compromising business networks. The vulnerability, identified as CVE-2024-40766, is from the management access interface of the firewall…

Data Poisoning: The Hidden Threat to AI Models

As ongoing developments in the realms of artificial intelligence and machine learning take place at a dynamic rate, yet another new form of attack is emerging, one which can topple all those systems we use today without much ado: data…

SpyAgent Malware Uses OCR Tech to Attack Crypto Wallets

Malware Using OCR to Steal Crypto Keys Cybersecurity experts have found a new malware threat that lures users into downloading a malicious app to grow. An advanced malware strain campaign has surfaced from North Korea, it attacks cryptocurrency wallets by…

Continuous Threat Exposure Management: A Proactive Cybersecurity Approach

  Continuous Threat Exposure Management (CTEM) represents a significant shift in cybersecurity strategy, moving beyond the limitations of traditional vulnerability management. In an era where data breaches and ransomware attacks remain prevalent despite substantial cybersecurity investments, CTEM offers a comprehensive…

CyberVolk Ransomware: A Rising Threat to Global Cybersecurity

  The Indian hacker outfit CyberVolk, which is a relatively new player in the cybercrime arena, has made headlines with its sophisticated ransomware. CyberVolk Ransomware, discovered in July 2024, has quickly gained attention for its sophisticated features and quick progress. …

Council of Europe Lunches First AI Treaty

The Council of Europe has launched the first legally binding international treaty on artificial intelligence (AI) to align AI usage with the principles of human rights, democracy, and the rule of law. Known as the Framework Convention on Artificial Intelligence,…

TFL Hit by Cyberattack, Leaving Disabled Riders Stranded

  Transport for London (TfL) recently confirmed that disabled passengers are the first group to feel the effects of a cyberattack that has hit their systems. This incident has severely impacted the Dial-a-Ride service, a specialised transport service designed for…

83% of Businesses Hit by Ransomware – Are You Next?

  Ransomware continues to be a critical threat to businesses worldwide, with a staggering 83% of organisations reporting they experienced at least one ransomware attack in the last year. Alarmingly, almost half of those affected (46%) faced four or more…

Here’s Why Attackers Have a Upper Hand Against CISOs

  Security experts have an in-depth knowledge of the technical tactics, techniques, and procedures (TTPs) that attackers employ to launch cyberattacks. They are also knowledgeable about critical defensive methods, such as prioritising patching based on risk and creating a zero-trust…

Enterprise Resilience in the Face of Cyber Risk

  There are now more than $10 trillion in annual cybercrime costs in the world, which speaks volumes about how quickly data breaches, ransomware attacks, and malicious disruption of business and government operations are growing in scale and scope. Cyber…

Halliburton Hit by Cyberattack, Data Stolen

  Halliburton, one of the world’s largest energy companies, has confirmed that it was the victim of a cyberattack. Hackers infiltrated the company’s systems and stole sensitive information. The attack occurred last week, and Halliburton is still determining the extent…

CISA Launches Major Effort to Secure the 2024 U.S. Elections

  The Cybersecurity and Infrastructure Security Agency (CISA) in the United States has initiated a comprehensive campaign to secure the 2024 elections. This effort involves deploying specialized advisory teams across the nation and coordinating security exercises with federal, state, and…

Is Telegram Still a Safe Messaging App? An In-Depth Look

Telegram, a popular messaging app launched in 2013, has earned a reputation for its robust security features. This Dubai-based platform offers end-to-end encryption for video and voice calls and in its optional feature, Secret Chats. This encryption ensures that only…

Top 5 Notable Cyberattacks in Modern Warfare

  Warfare is no longer restricted to traditional battlefields; in the digital age, cyberspace has emerged as a new arena of conflict. Nations now engage in cyber battles using lines of code and advanced malware instead of conventional weapons. A…

U.S. Courts Under Cyberattack and the Impact on Justice

  Due to the sophistication of cyber threats, cybercriminals target judicial systems more often, exposing significant vulnerabilities. Numerous attacks disrupt court operations and have broader implications, as they hurt employers who use public records to check their criminal records. Gaining…

Security Alert for Gmail, Facebook, and Amazon Users

  The number of hacks that occur on Google, Gmail, and Amazon accounts keeps on rising, causing users to become anxious. By using phishing tactics, hackers are targeting users’ passwords for Gmail, Facebook, and Amazon through phishing campaigns that pose…

The Corona Mirai Botnet: Exploiting End-of-Life IP Cameras

A recent report by Akami experts highlights a troubling trend: the exploitation of a five-year-old zero-day vulnerability in end-of-life IP cameras by the Corona Mirai-based malware botnet. This blog delves into the details of this issue, its implications, and the…

Chinese Hackers Exploit Serious Flaw in Versa SD-WAN Systems

  A Chinese cyber-espionage group, known as Volt Typhoon, has been exploiting a newly discovered security flaw in Versa Networks’ SD-WAN Director servers. This zero-day vulnerability, identified as CVE-2024-39717, has already been used to infiltrate several organizations. Given the seriousness…

Bling Libra Shifts Focus to Extortion in Cloud-Based Attacks

  It was observed during an incident response engagement handled by Unit 42, that the threat actor group Bling Libra (which was responsible for distributing ShinyHunters ransomware) had shifted from extortion to extortion of victims rather than its traditional tactic…

Private Data of 950K Users Stolen in BlackSuit Ransomware Attack

  On April 10, 2024, a BlackSuit ransomware assault disclosed 954,177 personally identifiable information, forcing Young Consulting to send out data breach notifications.  Young Consulting (formerly Connexure) is an Atlanta-based software solutions provider that specialises in the employer stop-loss marketplace.…

Bitcoin and Nostr: What Lies Beyond Decentralization and Freedom

In today’s digital expanse, in some countries governments and corporations wield immense power, two remarkable projects—Bitcoin and Nostr—have emerged as champions of decentralization. Their stories are quite similiar, revealing their struggle for financial autonomy, censorship resistance, and individual empowerment. Bitcoin:…

Why AI-Driven Cybercrime Could Be Your Business’s Biggest Risk

  The way technology keeps shifting its paradigm, the line between genuine interactions and digital deception is becoming increasingly difficult to distinguish. Today’s cybercriminals are leveraging the power of generative artificial intelligence (AI) to create more closely intricate and harder-to-detect…

Here’s How to Safeguard Yourself Against Phone Scams

  Sophisticated phone scams are becoming more common and more relentless. The numbers are mind-boggling. According to the FTC, impostor fraudsters cost US consumers $2.7 billion in 2023, and the figure is rising year after year.  These are merely the…