Tag: CySecurity News – Latest Information Security and Hacking Incidents

CrowdStrike Explains Root Cause of Globat IT Outage

In July 2023, we witnessed a large-scale global breakdown impacting over 8.5 million Microsoft users. The reason? A software update that turned into chaos. Leading cybersecurity company CrowdStrike recently published its root cause analysis, providing insights on the incident. Let’s…

BlackSuit Ransomware: A New Threat on the Rise

  The FBI and CISA have alerted organizations about a new ransomware strain known as BlackSuit. This malware is an advanced version of the Royal ransomware, which caused significant disruptions between September 2022 and June 2023. Since becoming active in…

Exposing the Business of Doxing and Its Perils

  Doxing, a once obscure practice of publishing someone’s private information online without their consent, has evolved into a dangerous and profitable underground industry. The dark world of doxing has grown increasingly sophisticated, with malicious actors exploiting the vast amounts…

Ransomware and Extortionware: The Two Cybersecurity Dangers

In the rapidly changing landscape of cybersecurity dangers, two threats are often in discussion, ransomware and extortionware. While both have some similarities, it is important to understand their differences for efficient defense tactics.  What is Ransomware? Ransomware is a type…

How North Korean Attackers Deployed Malware Via VPN Bug Exploit

In a concerning event, North Korean state-sponsored have again displayed their advanced cyber capabilities by abusing flaws in VPN software updates to plant malware. The incident highlights the rising threats from state-sponsored actors in the cybersecurity sector. “The Information Community…

MCA to Strike Off 400 Chinese Companies for Fraud in India

  The Ministry of Corporate Affairs (MCA) is preparing to strike off as many as 400 Chinese companies operating in India due to severe financial irregularities and incorporation-related fraud. These companies, which primarily deal in online loans and job services,…

Hackers Steal 6 Terabytes Data, Sells on Dark Web

The City of Columbus faces a major cybersecurity threat due to a hacking group Rhysida’s claims of stealing a massive 6.5 terabytes of sensitive information. The data heist happened after a ransomware attack on July 18 that forced the city…

New APK Scam: Protect Your Bank Account from Fraudsters

  Punjab and Sind Bank (PSB) recently issued a public notice alerting customers to a new scam involving fraudulent messages and malicious APK files. This scam threatens grave  financial losses if customers do not take proper precautions. How the APK…

OpenAI’s Tool Can Detect Chat-GPT Written Texts

OpenAI to Release AI Detection Tool OpenAI has been at the forefront of the evolving AI landscape, doing wonders with its machine learning and natural language processing capabilities. One of its best creations, ChatGPT, is known for creating human-like text.…

Hackers Breach ISP to Poison Software Updates With Malware

  A Chinese hacking group, known as StormBamboo, has compromised an internet service provider (ISP) to distribute malware through automatic software updates. This cyber-espionage group, also called Evasive Panda, Daggerfly, and StormCloud, has been active since at least 2012, targeting…

Massive Exposure of Illinois Voter Data Raises Security Concerns

  Cybersecurity expert Jeremiah Fowler recently uncovered a concerning data breach involving over 4.6 million voter records and election-related documents. These sensitive files were discovered in 13 unprotected databases managed by a technology contractor based in Illinois. Company Behind the…

Stop Using AI for Medical Diagnosis: Experts

AI (artificial intelligence) has become an important tool in many spheres of life such as education, jobs, and the field of medical research as well. However, there have been concerns about AI providing medical advice to individual queries of patients…

Sitting Ducks DNS Attack Hijack 35,000 Domains

  Cybersecurity researchers have uncovered a significant threat affecting the internet’s Domain Name System (DNS) infrastructure, known as the “Sitting Ducks” attack. This sophisticated method allows cybercriminals to hijack domains without needing access to the owner’s account at the DNS…

Indonesia Bans Search Engine DuckDuckGo

  Bad news for anyone concerned about their privacy who lives in or plans to visit Indonesia in the near future. As authorities ramp up their efforts to combat illegal online gambling and pornography, online privacy suffers as a result.…

Why Did Turkey Suddenly Ban Instagram? The Shocking Reason Revealed

  On Friday, Turkey’s Information and Communication Technologies Authority (ICTA) unexpectedly blocked Instagram access across the country. The ICTA, responsible for overseeing internet regulations, did not provide any specific reason for the ban. However, according to reports from Yeni Safak,…

Generative AI Set To Transform Automotive Industry

For the car sector, generative AI (GenAI) has the potential to transform how automobiles run and are maintained. GenAI’s ability to learn from massive volumes of data, make intelligent decisions, and improve processes makes it extremely useful in this industry.…

Dark Web Actor Claims Responsibility of ADT Data Breach

  A dark web actor has claimed responsibility for a data breach affecting ADT, an American security company known for its residential and commercial alarm monitoring services. On August 1, 2024, an individual or group using the alias “netnsher” publicly…

Abuse of Cloudflare Tunnel Service for Malware Campaigns Delivering RATs

  Researchers have raised alarms over cybercriminals increasingly exploiting the Cloudflare Tunnel service in malware campaigns that predominantly distribute remote access trojans (RATs). This malicious activity, first detected in February, utilizes the TryCloudflare free service to disseminate multiple RATs, including…

World’s First AI Law: A Tough Blow for Tech Giants

In May, EU member states, lawmakers, and the European Commission — the EU’s executive body — finalized the AI Act, a significant guideline that intends to oversee how corporations create, use, and use AI.  The European Union’s major AI law…

The Use of AI by Sales Teams is Booming

  According to Salesforce’s 2024 State of Sales report, sales teams are combining tools and strengthening data security to reap the benefits of AI. Following a global survey of 5,500 sales professionals, the report’s four main findings are as follows: …

Ransomware Groups Exploit VMware ESXi Bug for Widespread Attacks

  Several ransomware groups have been exploiting a vulnerability in VMware ESXi hypervisors that allows them to bypass authentication and rapidly deploy malware across virtual environments. Identified as CVE-2024-37085, this bug has been assigned a “medium” severity rating of 6.8…

Domain Validation Bug: DigiCert Revokes TLS Certificates

In a major development in the tech landscape, SSL/TLS certificate provider “DigiCert” recently announced that it will be revoking around 83,267 certificates. This big step was taken due to a bug in their domain validation process, which dented the integrity…

HealthEquity Data Breach Exposes Personal Information

  HealthEquity, a leading provider of Health Savings Accounts (HSAs), has confirmed a significant data breach affecting potentially 4.3 million customers. The breach, discovered in March but only confirmed in June, involved unauthorized access to a data repository containing sensitive…

OAuth and XSS Bugs: Exposing Data of Millions of Users

The cyberspace landscape changes frequently, sometimes the change is good, while sometimes we stumble across challenges.  One such problem surfaced recently when Salt Labs experts found OAuth (Open Authorization) implementation flaws and cross-site scripting (XSS) vulnerabilities in the Hotjar service,…

The CISO: A Cornerstone of Private Equity Success

  In the dynamic landscape of private equity, the Chief Information Security Officer (CISO) has emerged as a critical player. Beyond safeguarding digital assets, the CISO is instrumental in driving business growth and ensuring regulatory compliance. The CISO’s role extends…

Cloud Security Challenges Extend Beyond Technology

  As cloud technologies become integral to business operations, organisations face not only opportunities but also pertaining challenges. The widespread use of cloud services has created a complex environment involving multiple providers and regions, each with its own regulations and…

Crypto Exchange Gemini Confirms Third-Party Data Breach

  Cryptocurrency exchange Gemini has issued a warning about a data breach incident that resulted from a cyberattack at its Automated Clearing House (ACH) service provider. The identity of the attacker was kept confidential. On June 26, 2024, the American…

Balancing Privacy and Authenticity in the Digital Age

The ubiquitous nature of online platforms has led to an increased risk of privacy breaches and data exploitation. While providing false information can serve as a protective measure against unwanted intrusions, it is essential to discern when such a strategy…

Google’s New Feature to Protect Users From Fake Calls

Google is preparing to drastically improve its Phone app with a potent new weapon against fraudulent calls. An APK deconstruction revealed that the tech behemoth is creating an AI-powered scam detection feature that could be released shortly. About the feature…

Ukraine Hacks ATMs Across Russia in Massive Cyberattack

On July 23, 2024, a massive cyberattack launched by Ukrainian hackers targeted Russian financial institutions, disrupting ATM services across the country. According to a source within Ukrainian intelligence, the attack is “gaining momentum” as it continues to cripple banking services.…

Understanding VPN Protocols: Ensuring Your Data Security

Navigating the different types of VPNs can be overwhelming, especially for beginners. VPN protocols might seem like random combinations of letters and numbers without any clear meaning. To simplify things, I’ll explain the key differences between the protocols used by…

FBCS Data Breach Affects 4.2 Million Americans

  Financial Business and Consumer Solutions (FBCS), a debt collection agency, has announced that a data breach in February 2024 has now affected 4.2 million people in the U.S. This is a drastic rise from previous reports and underscores the…

Mandiant: North Korean Hackers Are Targeting Naval Tech

  Google Cloud’s Mandiant cyber researchers have upgraded Andariel, also known as Onyx Sleet, Plutonium, and Silent Chollima, to an official advanced persistent threat (APT) group, alerting that it is targeting extremely sensitive atomic secrets and technology as North Korea…

KnowBe4 Avoids Data Breach After Hiring North Korean Hacker

  American cybersecurity firm KnowBe4 recently discovered that a new hire, brought on as a Principal Software Engineer, was actually a North Korean state actor. This individual attempted to install data-stealing malware on the company’s devices, but the threat was…

Indian Govt Confirms BSNL User Data Breach

  On Wednesday, July 24, Union Minister of State for Communications Chandra Shekar Pemmasani revealed the breach at state-owned telecom operator Bharat Sanchar Nigam Limited (BSNL) in the Lok Sabha. The breach occurred on May 20, the Minister stated in a…

CyberCartel: Latest Banking Trojan Threat in Chrome Extensions

In recent years, Latin America (LATAM) has become a favourite target for threat actors, especially those attacking financial organizations. The recent report by Security Intelligence titled “Unveiling the Latest Banking Threats in LATAM,” explains the changing scenario of banking Trojans…

Cyber Heist: Rs 40 Crore Taken from IndusInd Bank

  According to Maharashtra Cyber, which reported the recovery of 31.89 crores out of 40 crores allegedly fraudulently transferred from IndusInd Bank to 20 different mule accounts on Friday, the agency said. As a result of the fraud, more than…

Pharmacy Network Sues Change Healthcare Post-Cyberattack

  Several pharmacy groups joined several healthcare providers in suing Change Healthcare over the March cyberattack on their system that left it vulnerable to cyberattacks. There is an allegation that some healthcare providers will still have to wait for delayed…

ERP Firm Data Breach Exposes Over 750 Million Records

  A leading Enterprise Resource Planning (ERP) company based in Mexico inadvertently left an unsecured database online, exposing sensitive information on hundreds of thousands of users. This was discovered by cybersecurity researcher Jeremiah Fowler, who reported his findings to Website…