A recent phishing scheme has emerged, posing as a ‘copyright infringement’ email to deceive Instagram users and pilfer their backup codes. These codes, integral for the recovery of accounts, are used to circumvent the two-factor authentication safeguarding users’ accounts.…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
HackersEra Launches Telecom Penetration Testing to Eliminate Cyber Threats
Cybercriminals have attacked telecom infrastructure, particularly as it shifts to an IP-based design with the introduction of Long-Term Evolution (LTE) networks, also referred to as LTE or 4G. Persistent attackers could spy on users’ cellular networks and record data…
Mr. Cooper Data Breach: 14 Million Customers Exposed
A major data breach at mortgage giant Mr. Cooper compromised the personal data of an astounding 14 million consumers, according to a surprising disclosure. Sensitive data susceptibility in the digital age is a worry raised by the occurrence, which has…
Decoding the Elusive ‘FedEx’ Scam: An Inside Look at the Tactics and Challenges
One type of spam that is going around lately is FedEx scam calls, which have been targeting people, and are also doing the rounds. Most people have been victims of online fraud at some point in their lives. For…
Digital Landline Switch Halted for Vulnerable Users in UK
UK- based phone companies have halted vulnerable customers from switching to digital landlines following “serious incidents” where telecare devices stopped working. These devices, which can be used to call for assistance in an emergency, are estimated to be utilized by…
Unveiling Storm-1152: A Top Creator of Fake Microsoft Accounts
The Digital Crimes Unit of Microsoft disrupted a major supplier of cybercrime-as-a-service (CaaS) last week, dubbed Storm-1152. The attackers had registered over 750 million fake Microsoft accounts, which they planned to sell online to other cybercriminals, making millions of…
Telus Makes History with ISO Privacy Certification in AI Era
Telus, a prominent telecoms provider, has accomplished a significant milestone by obtaining the prestigious ISO Privacy by Design certification. This certification represents a critical turning point in the business’s dedication to prioritizing privacy. The accomplishment demonstrates Telus’ commitment to implementing…
Hacked Health: Unmasking the Reasons Behind the Targeting of Medical Facilities
There is no more important way to handle sensitive data in the healthcare field than to take care of the patient’s own health, which is why taking care of sensitive data is just as important. Especially now that healthcare…
Belgium Commences Mega Drug Trial After Covert Apps Cracked
A significant trial began in a Belgian court on Monday, involving over 120 individuals accused of offenses such as drug and arms trafficking, extortion, torture, and attempted murder. This trial is notable not only for its sheer scale but…
New Web Injection Malware Campaign Steals Bank Data of 50,000 People
In a new finding, it has been revealed that the malware campaign that first came to light in March 2023 has used JavScript web injections in an attempt to steal data from over 50 banks, belonging to around 50,000 used…
Kraft Heinz Investigates Cybersecurity Threat
Big businesses are not immune to the risks of hacking in this age of ubiquitous cyber threats. Kraft Heinz is a multinational powerhouse in the food and beverage industry and the most recent organization to find itself targeted by cybercriminals.…
Imperva Report Previously Undocumented 8220 Gang Activities
Imperva Threat Research team has recently discovered a previously unreported activity from the 8220 gang, which is well-known for mass-deploying a range of constantly evolving TTPs to distribute malware in large quantities. The threat actor has a history of using…
Microsoft Introduces Enhanced Windows Protected Print Mode for Increased Security
Microsoft has revealed the introduction of Windows Protected Print Mode (WPP), a new feature that brings significant security enhancements to the Windows print system. According to Johnathan Norman, the principal engineer manager at Microsoft Offensive Research & Security Engineering…
Here’s How to Avoid Falling for Costly Pig Butchering Scam
Hardly a day passes when we fail to notice some sort of scam on our phones or in our emails, attempting to trick us into downloading malware, revealing a password, or making a payment for something that isn’t genuine.…
Massive Data Breach at Gokumarket: Over a Million Users’ Information Exposed
Several days before the leak, the GokuMarket team found an unprotected MongoDB instance, which was storing information about its users, namely those who bought and sold crypto on the exchange. In GokuMarket’s case, it is the details of more…
Mobile Security Alert: CERT-In Flags Risks in Top Brands
The Indian Computer Emergency Response Team (CERT-In) has discovered security flaws in high-profile smartphone brands, including Samsung, Apple, and Google Pixel devices. After carefully analyzing these devices’ security features, CERT-In has identified certain possible weaknesses that can jeopardize user privacy…
NKAbuse Malware Utilizes NKN Blockchain Technology for Executing DDoS Attacks
A newly identified multi-platform threat named NKAbuse has surfaced, employing a decentralized peer-to-peer network connectivity protocol known as NKN (New Kind of Network) for communication. Russian cybersecurity firm Kaspersky detailed the malware’s capabilities in a report, describing it as…
Cyber Criminals Seek $2 Million in Bitcoin After Siphoning Insomniac Games Data
The Rhysida hacker group is believed to have carried out a cyberattack against Insomniac Games and is now demanding a ransom, starting at 50 Bitcoin, or more than $2 million. Sony, which owns the Spider-Man 2 and Ratchet &…
Data Insecurity: Experts Sound the Alarm on 4 Apps Putting User Privacy at Risk
Security in the digital world continues to become more and more important with every passing year. Even though many of us rely on apps to entertain us, guide us, manage our exercise, and connect with family and friends, they…
China’s MIIT Proposes Color-coded Contingency Plan for Security Incidents
On Friday, China proposed a four-tier classification system, in an effort to address data security incidents, underscoring concerns of Beijing in regards to the widespread data leaks and hacking incidents in the country. This emergency plan comes when the country…