Stormous, a ransomware group, has admitted to orchestrating the cyber assault on Duvel Moortgat Brewery last Wednesday. Fortunately for beer enthusiasts, the brewery has ample stock to withstand the disruption. The ransom group announced their involvement via the dark…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
China State-Sponsored Spies Hack Site and Target User Systems in Asia
Chinese threat actors strike again Users of a Tibetan language translation app and website visitors to a Buddhist festival were compromised by a focused watering-hole malware connected to a Chinese threat group. According to recent data from ESET, the so-called…
South St. Paul Public Schools Grapple with Ongoing Tech Disruption
South St. Paul Public Schools recently alerted families to ongoing technology disruption, shedding light on potential disruptions to online platforms, emails, and other digital services. In a note on Monday, the district acknowledged technical difficulties and later revealed the…
Fidelity Faces Second Data Breach Linked to Third-Party Provider: Infosys McCamish
Fidelity Investments Life Insurance Company (FILI) faces another data breach challenge as it discloses a breach affecting a significant number of individuals. The breach, linked to third-party service provider Infosys McCamish (IMS), heightens worries over data security in today’s…
New Email Scam Targets NTLM Hashes in Covert Data Theft Operation
TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is…
NSA Shares Key Strategies for Improved Network Security
The National Security Agency (NSA) has rolled out a comprehensive roadmap to strengthen internal network security. Stepping away from the traditional trust-all model, the focus is on embracing a cutting-edge zero-trust framework. This transformative approach assumes the presence of…
Researchers Develop AI “Worms” Capable of Inter-System Spread, Enabling Data Theft Along the Way
A team of researchers has developed a self-replicating computer worm designed to target AI-powered applications like Gemini Pro, ChatGPT 4.0, and LLaVA. The aim of this project was to showcase the vulnerabilities in AI-enabled systems, particularly how interconnections between…
Canadian City Says Timescale for Recovering from Ransomware Attack ‘Unknown’
The Canadian city of Hamilton is still getting over a ransomware attack that compromised nearly every facet of municipal operations. Since February 25, when the ransomware attack was first reported, city officials have been working nonstop. Foundational services, such…
GhostLocker 2.0 Unleashes Cyber Haunting Spree in the Middle East, Africa, and Asia
A new version of the infamous GhostLocker ransomware has been developed by cyber criminals, and they are now targeting users across the Middle East, Africa, and Asia with this ransomware. With the help of the new GhostLocker 2.0 ransomware,…
Scam: Chennai Woman Exposes Cyber Crime Involving Adhaar Card, Courier, Drugs
Woman discloses scam, alerts netizens By bringing attention to a fresh cybercrime strategy, a marketing expert from Chennai has assisted others in avoiding the scam. Lavanya Mohan, the woman, talked about her experience on X, (formerly Twitter). She said how…
Web-Based PLC Malware: A New Frontier in Industrial Cybersecurity Threats
The increasing prevalence of programmable logic controllers (PLCs) featuring embedded web servers has opened avenues for potential catastrophic remote attacks on operational technology (OT) within industrial control systems (ICS) in critical infrastructure sectors. Researchers from the Georgia Institute of…
Woman in Noida Swindled of Rs 3.7 Lakh During 7-Hour Skype Call in Recent ‘Digital Arrest’ Scam
A 32-year-old female IT engineer residing in Noida fell victim to cyber criminals who reportedly swindled Rs 3.75 lakh from her during a seven-hour Skype call, where they held her “hostage” and gradually siphoned money from her account. According…
Red Sea Cable Damage Disrupts Internet Traffic Across Continents
Recently, in a telecommunications setback, damage to submarine cables in the Red Sea is causing disruptions in communication networks, affecting a quarter of the traffic between Asia, Europe, and the Middle East, including internet services. Four major telecom networks,…
United Health Allegedly Paid $22M Ransomware
Change Healthcare breach There is evidence that the ransomware group behind the Change Healthcare breach, which has caused chaos for hospitals and pharmacies attempting to handle prescriptions, may have received $22 million from UnitedHealth Group. Researchers studying security issues discovered…
5 Simple Steps to Bulletproof Your API Integrations and Keep Hackers at Bay
In today’s tech-driven world, APIs (Application Programming Interfaces) are like the connective tissue that allows different software to talk to each other, making our digital experiences seamless. But because they are so crucial, they are also prime targets for hackers. …
UnitedHealth’s Cyberattack Should Serve as a ‘Wake-up Call’ for HealthCare Sector
The US Health and Human Services Department (HHS) announced Tuesday that it would assist doctors and hospitals in locating alternate claims processing platforms to help restart the flow of business following a cyberattack on a UnitedHealth Group (UNH) subsidiary…
American Express Breach: Safeguarding Your Finances Amidst Third-Party Data Exposure
In a recent development, American Express has issued a warning to its customers regarding a potential data breach originating from a third-party merchant processor. Although the breach did not directly involve American Express systems, the credit card data of…
Security Breach at Mr. Green Gaming: 27,000 User Data Compromises
Several internet forums are bombarded with headlines claiming that a “Mr Green Gaming user database has been leaked” as a serious security breach threatens the online gaming community. Significant concerns about online security and privacy have been raised due…
Web3: A New Dawn for the Internet?
In the fast-paced world of technology, a revolutionary concept is gaining traction: Web3. Coined by computer scientist Gavin Wood, Web3 represents a paradigm shift towards a decentralized internet infrastructure, powered by blockchain technology. The traditional internet, often referred to…
Cyberattack on Hamilton City Hall Expands to Impact Additional Services
Hamilton is currently facing a ransomware attack, causing widespread disruptions to city services for more than a week. City manager Marnie Cluckie disclosed the nature of the cyber attack during a virtual press conference on Monday, marking the first…