Moonstone Sleet: A New North Korean Threat Actor Microsoft discovered a new North Korean threat actor, Moonstone Sleet (formerly Storm-1789), who targets companies with a combination of tried-and-true techniques used by other North Korean threat actors as well as unique…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Security Lapse at First American Exposes Data of 44,000 Clients
It has been reported that First American Financial Corporation, one of the largest title insurance companies in the United States, was compromised in December when the company’s computer systems were taken down due to a cyberattack that compromised the…
FBI Takes Down Massive Global Army of Zombie Computer Device
In a significant victory against cybercrime, an international law enforcement team has successfully dismantled the massive “911 S5” botnet, which has been operational for almost a decade. This extensive network, believed to be the largest of its kind globally,…
SEC Tightens Cybersecurity Regulations for Public Companies
In 2023, the Securities and Exchange Commission (SEC) significantly tightened its cybersecurity regulations for publicly traded companies. This move, aimed at enhancing investor protection and ensuring market transparency, responds to the increasing prevalence of cyber threats and their potential…
Fraudulent SMS Entities Blacklisted in Government Crackdown
An official release states that the government has blacklisted ‘principal entities’ behind SMS headers that have been sent over 10,000 fraudulent messages over the past three months as part of a crackdown on SMS scammers. As part of the Sanchar…
Facebook Account Takeovers: Can Tech Giant Stop Hijacking Scams?
A Go Public investigation discovered that Meta has allowed a scam campaign to flourish on Facebook, as fraudsters lock users out of their accounts and mimic them. According to the CBC, Lesa Lowery is one of the many victims.…
Phishing Campaigns Exploit Cloudflare Workers to Harvest User Credentials
Cybersecurity researchers are raising alarms about phishing campaigns that exploit Cloudflare Workers to serve phishing sites designed to harvest user credentials associated with Microsoft, Gmail, Yahoo!, and cPanel Webmail. This attack method, known as transparent phishing or adversary-in-the-middle (AitM)…
Navigating the Danger Zone: Discord’s Battle Against Malware
In a recent six-month investigation, cybersecurity firm Bitdefender discovered a disturbing trend: fraudsters are using Discord, a popular communication platform, to distribute malware and carry out phishing attacks. The Rise of Malicious Links The research, in which Bitdefender shows over 50,000…
Ransomware Attack Struck This Medical Device Manufacturer
LivaNova employees have been impacted by a ransomware attack, with the LockBit group claiming responsibility. The UK-based medical device manufacturer, LivaNova, has notified current and former employees about a “cybersecurity incident” that compromised their personal data. The stolen information…
Hackers Use Trojanized Minesweeper Clone to Phish Financial Organizations
Hackers are exploiting code from a Python clone of Microsoft’s classic Minesweeper game to conceal malicious scripts in attacks targeting financial institutions in Europe and the US. Ukraine’s CSIRT-NBU and CERT-UA have identified the threat actor ‘UAC-0188’ as responsible…
AI Transforming Education in the South East: A New Era for Schools
Artificial Intelligence (AI) is increasingly shaping the future of education in the South East, moving beyond its initial role as a tool for students to assist with essay writing. Schools are now integrating AI into their administrative and teaching…
Investigating the Potential Benefits of Periodic iPhone Shutdowns
Even though people rely on smartphones and iPhones to communicate, entertain, and be productive, many users fail to turn off their iPhones regularly. Despite this, they still use them for communication, entertainment, and productivity. As simple as this is…
Cisco Firepower Management Center Impacted By a High-Severity Vulnerability
Cisco addressed a flaw in the web-based management interface of the Firepower Management Centre (FMC) Software, identified as CVE-2024-20360 (CVSS score 8.8). The vulnerability is a SQL injection bug; an intruder can use it to acquire any data from…
History Meets Hackers: Internet Archive Battles Ongoing DDoS Attacks
The Internet Archive is allegedly subject to continuing DDoS (distributed denial-of-service) attacks. The attacks began over the Memorial Day holiday weekend, according to the California-based charity, and some users reported being unable to access the digital archive site for several hours on Monday.…
Iranian Hacker Group Void Manticore Linked to Destructive Cyber Attacks on Israel and Albania
A recent report from Check Point Research (CPR) has unveiled the activities of an Iranian hacker group known as Void Manticore, which has been linked to a series of destructive cyber attacks on Israel and Albania. Affiliated with Iran’s…
Geoffrey Hinton Discusses Risks and Societal Impacts of AI Advancements
Geoffrey Hinton, often referred to as the “godfather of artificial intelligence,” has expressed grave concerns about the rapid advancements in AI technology, emphasising potential human-extinction level threats and significant job displacement. In an interview with BBC Newsnight, Hinton warned…
400% Increase in MoD Data Breaches Sparks Fears of Cyber Threats from Russia and China
Data breaches within the Ministry of Defence (MoD) have surged nearly fivefold over the past five years, raising concerns about the UK’s resilience against cyber threats from nations like Russia and China. MoD figures reveal 550 data incidents last…
Risks of Generative AI for Organisations and How to Manage Them
Employers should be aware of the potential data protection issues before experimenting with generative AI tools like ChatGPT. You can’t just feed human resources data into a generative AI tool because of the rise in privacy and data protection…
Combatting International Spoofed Calls: India’s New Measures to Protect Citizens
In recent times, fraudsters have increasingly used international spoofed calls displaying Indian mobile numbers to commit cybercrime and financial fraud. These calls, which appear to originate within India, are actually made by criminals abroad who manipulate the calling line…
From Courtroom to Cyber Threat: The JAVS Viewer 8 Incident
Hackers have broken into a popular brand of recording software used in courtrooms, jails, and prisons, allowing them to obtain complete control of the system via a backdoor implanted in an update to the application. Software and its purpose Justice…