The non-bank mortgage lender Firstmac has been hit by a cyberattack, resulting in the theft and publication of customer details such as credit card numbers, passport numbers, Medicare numbers, and driver’s licence details on the dark web. Firstmac, a…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Here’s Why Tokens Are Like Treasure for Opportunistic Attackers
Authentication tokens are not tangible tokens, of course. However, if these digital IDs are not routinely expired or restricted to a single device, they may be worth millions of dollars in the hands of threat actors. Authentication tokens (…
Apple Warns Windows Users: Critical Security Vulnerability in iTunes
Apple confirms the finding of a critical security flaw in the iTunes program for Windows 10 and Windows 11 users, which could have allowed malicious attackers to execute code remotely at will. Willy R. Vasquez, a security researcher at the…
Australia’s Premier Non-Bank Lender Suffers Data Security Breach
One of Australia’s largest non-bank mortgage lenders, Firstmac, has suffered a cyberattack, which resulted in customer information such as credit card and passport numbers, Medicare numbers and driver’s licence numbers being stolen and published on the dark web. In…
Critical Infrastructure and the Importance of Safeguarding it in the Digital Age
In today’s digital age, our society relies heavily on critical infrastructure to function smoothly. These infrastructures, including power grids, water systems, and communication networks, form the backbone of our daily lives, facilitating everything from electricity distribution to internet connectivity. …
Student Hijacking: Cyberattack Exposes 8,000 Students’ Data in Hong Kong
The personal information of over 8,000 students at a private Hong Kong college has been taken and purportedly placed on the dark web, the latest in a string of cyberattacks in the city that have prompted calls for greater security.…
Can Legal Measures Slow Down Cybercrimes?
Cybercrime has transpired as a serious threat in India, prompting calls for comprehensive reforms and collaborative efforts from various stakeholders. Experts and officials emphasise the pressing need to address the evolving nature of cyber threats and strengthen the country’s…
Cyber Criminals Exploiting MS-SQL Severs To Deploy Mallox Ransomware
The MS-SQL (Microsoft SQL) honeypot incident that took place recently highlighted the sophisticated strategies used by cybercriminals that rely on the Mallox ransomware (also known as Fargo, TargetCompany, Mawahelper, etc.). The honeypot, set up by the Sekoia researchers, was…
Ransomware Attacks Now Targeting Corporate Executives’ Children
Mandiant, a prominent cybersecurity firm and subsidiary of Google, highlights the escalating creativity of malicious hackers as corporations reinforce their cyber defenses. These hackers have extended their targets to include the children of corporate executives, employing ransomware tactics to…
26 Million Records Leaked: The Post-Millennial Hack Raises Privacy Concerns
The data from the hack of The Post Millennial conservative news website has been added to Have I Been Pwned, which recently uncovered the information of 26,818,266 people whose data had been stolen. Human Events Media Group is a…
Unlocking the Mystery: Key Fob Vulnerabilities Exposed
According to security researchers, the key fob is extremely hackable, and, in addition, it is convenient. In terms of digital security, the car key fob does not have the greatest reputation when it comes to safety. As of late,…
New Ransomware Threat Hits Hundreds of Organisations Worldwide
In a recent joint report by the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI), a new ransomware gang named Black Basta has been identified as breaching over 500 organisations globally between April 2022 and…
Predictive AI: What Do We Need to Understand?
We all are no strangers to artificial intelligence (AI) expanding over our lives, but Predictive AI stands out as uncharted waters. What exactly fuels its predictive prowess, and how does it operate? Let’s take a detailed exploration of Predictive AI,…
Emphasizing Post-Breach Strategies in Cybersecurity
Cybersecurity discourse heavily emphasizes prevention, yet often neglects post-breach strategies. While we invest significant effort in establishing protocols to avert attacks, breaches remain an unavoidable reality. The “IBM Cyber Security Intelligence Index” report highlights human error as a leading…
Cybercriminals Are Becoming More Proficient at Exploiting Vulnerabilities
According to Fortinet, cybercriminals have their sights on the increasing number of new vulnerabilities triggered by the expansion of online services and applications, as well as the rapid rise in the number and variety of connected devices. It’s only…
Europol Confirms Web Portal Breach: No Operational Data Stolen
In a recent incident, Europol’s Europol Platform for Experts (EPE) portal experienced a security breach. The breach occurred within a closed user group, raising concerns about data security and operational integrity. In this blog post, we delve into the details…
Understanding Vishing and Quishing: Protecting Yourself Against Telephone and QR Code Scams
In our digitally interconnected world, cybercriminals continuously devise new methods to exploit technology for their malicious intents. Two prevalent schemes gaining traction are vishing and quishing scams. These fraudulent activities capitalize on telephone calls and QR codes to deceive…
Dell API Abused to Steal 49 Million Customer Records in Data Breach
The threat actor responsible for the recent Dell data breach stated that he scraped information from 49 million customer records via a partner portal API that he accessed as a phony organization. Dell had begun sending alerts to customers informing…
Understanding the Complexities of VPNs: Balancing Privacy and Security in the Digital Age
Virtual private networks (VPNs) are crafted to safeguard online privacy through the encryption of internet traffic and concealment of IP addresses, thereby preventing the determination of user locations. This functionality becomes apparent when users attempt to access websites or…
WordPress Vulnerabilities, Exploiting LiteSpeed Cache and Email Subscribers Plugins
In recent cybersecurity developments, hackers have been leveraging a critical vulnerability within the LiteSpeed Cache plugin for WordPress to exploit websites running outdated versions. LiteSpeed Cache, a popular caching plugin utilized by over five million WordPress sites, is designed…