This is the biggest-ever international operation against ransomware, coordinated by the justice and police agencies of the European Union. Police have taken down computer networks that spread ransomware via infected emails in what is described as the largest international…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
California Advances AI Regulation to Tackle Discrimination and Privacy Concerns
California lawmakers are making significant strides in regulating artificial intelligence (AI) technologies, with a series of proposals aimed at addressing discrimination, misinformation, privacy concerns and prohibiting deepfakes in the contexts of elections and pornography, advancing in the legislature last…
Ransomware Attacks in Healthcare: A Threat to Patient Safety
Ransomware attacks in Healthcare: A threat to patient safety A ransomware attack on a major U.S. hospital network has been endangering patients’ health. Nurses are forced to manually enter prescription information and work without electronic health records cyberattacks have become…
Shell Data Breach: Hacker Group 888 Claims Responsibility
A hacker group known as 888 has claimed responsibility for a data breach targeting Shell, the British multinational oil and gas company. The breach, allegedly impacting around 80,000 individuals across multiple countries, has raised significant concerns about data security…
Seattle Public Library Hit by Ransomware Attack, Online Services Disrupted
The Seattle Public Library (SPL) has faced a significant cybersecurity incident, with its online services being disrupted due to a ransomware attack. This attack, detected over the weekend, led to the library taking proactive measures by bringing its online…
RedTail Cryptomining Malware Exploits Zero-Day Vulnerability in PAN-OS
Cryptomining malware, potentially of North Korean origin, is targeting edge devices, including a zero-day vulnerability in Palo Alto Networks’ custom operating system that the company quickly patched in April. Researchers from Akamai identified the malware, dubbed RedTail due to…
Professional Sporting Events: The Next Frontier of Cybersecurity?
Professional sports has a cybersecurity issue. Last year, the National Cyber Security Centre discovered that 70% of sports organisations face at least one cyberattack each year. This indicates a significant increase from general companies, of which only 32% reported dealing…
Ticketmaster Data Breach Affects Over 500 Million Customers
We are all music fans at heart, and recently the most eye-catching tour is the three-hour Taylor Swift concert. The platform that sells tickets for these in-demand tours, Ticketmaster, has taken a hit. In a substantial blow to one…
Why CVEs Reflect an Incentives Problem
Two decades ago, economist Steven Levitt and New York Times reporter Stephen Dubner published “Freakonomics,” a book that applied economic principles to various social phenomena. They argued that understanding how people make decisions requires examining the incentives they respond…
Pirated Microsoft Office Distributes a Malware Cocktail to Infiltrates Systems
The hackers are distributing a malware cocktail via cracked versions of Microsoft Office marketed on torrent websites. Malware distributed to customers includes remote access trojans (RATs), cryptocurrency miners, malware downloaders, proxy tools, and anti-AV programs. The AhnLab Security Intelligence…
NIST Introduces ARIA Program to Enhance AI Safety and Reliability
The National Institute of Standards and Technology (NIST) has announced a new program called Assessing Risks and Impacts of AI (ARIA), aimed at better understanding the capabilities and impacts of artificial intelligence. ARIA is designed to help organizations and…
Enhancing Cybersecurity: Automated Vulnerability Detection and Red Team Exercises with Validation Scans
In today’s digital age, cybersecurity has become a top priority for organizations of all sizes. The ever-evolving landscape of cyber threats necessitates robust and comprehensive approaches to identifying and mitigating vulnerabilities. Two effective methods in this domain are automated vulnerability…
Unmasking Moonstone Sleet: A Deep Dive into North Korea’s Latest Cyber Threat
Moonstone Sleet: A New North Korean Threat Actor Microsoft discovered a new North Korean threat actor, Moonstone Sleet (formerly Storm-1789), who targets companies with a combination of tried-and-true techniques used by other North Korean threat actors as well as unique…
Security Lapse at First American Exposes Data of 44,000 Clients
It has been reported that First American Financial Corporation, one of the largest title insurance companies in the United States, was compromised in December when the company’s computer systems were taken down due to a cyberattack that compromised the…
FBI Takes Down Massive Global Army of Zombie Computer Device
In a significant victory against cybercrime, an international law enforcement team has successfully dismantled the massive “911 S5” botnet, which has been operational for almost a decade. This extensive network, believed to be the largest of its kind globally,…
SEC Tightens Cybersecurity Regulations for Public Companies
In 2023, the Securities and Exchange Commission (SEC) significantly tightened its cybersecurity regulations for publicly traded companies. This move, aimed at enhancing investor protection and ensuring market transparency, responds to the increasing prevalence of cyber threats and their potential…
Fraudulent SMS Entities Blacklisted in Government Crackdown
An official release states that the government has blacklisted ‘principal entities’ behind SMS headers that have been sent over 10,000 fraudulent messages over the past three months as part of a crackdown on SMS scammers. As part of the Sanchar…
Facebook Account Takeovers: Can Tech Giant Stop Hijacking Scams?
A Go Public investigation discovered that Meta has allowed a scam campaign to flourish on Facebook, as fraudsters lock users out of their accounts and mimic them. According to the CBC, Lesa Lowery is one of the many victims.…
Phishing Campaigns Exploit Cloudflare Workers to Harvest User Credentials
Cybersecurity researchers are raising alarms about phishing campaigns that exploit Cloudflare Workers to serve phishing sites designed to harvest user credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. This attack method, known as transparent phishing or adversary-in-the-middle (AitM)…
Navigating the Danger Zone: Discord’s Battle Against Malware
In a recent six-month investigation, cybersecurity firm Bitdefender discovered a disturbing trend: fraudsters are using Discord, a popular communication platform, to distribute malware and carry out phishing attacks. The Rise of Malicious Links The research, in which Bitdefender shows over 50,000…