T-Mobile and Verizon employees are being texted by criminals who are attempting to entice them into swapping SIM cards with cash. In their screenshots, the targeted employees are offering $300 as an incentive for those willing to assist the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
APT44: Unearthing Sandworm – A Cyber Threat Beyond Borders
APT44: Operations Against Ukraine A hacking group responsible for cyberattacks on water systems in the United States, Poland, and France is linked to the Russian military, according to a cybersecurity firm, indicating that Moscow may escalate its efforts to target…
Websites Engage in Deceptive Practices to Conceal the Scope of Data Collection and Sharing
Websites frequently conceal the extent to which they share our personal data, employing tactics to obscure their practices and prevent consumers from making fully informed decisions about their privacy. This lack of transparency has prompted governmental responses, such as…
International Cyber Fraud Ring Busted By London Police
UK Police stated that they have infiltrated a massive phishing website on the dark web that has defrauded tens of thousands of individuals, and learned that university students have turned to cyber fraud as a way to increase their…
Cisco Duo raises awareness over a breach in third-party data security, revealing the exposure of SMS MFA logs.
In the ever-evolving landscape of cybersecurity, safeguarding sensitive information and ensuring secure access to corporate networks are paramount concerns for organizations worldwide. Recently, Cisco Duo, a leading provider of multi-factor authentication (MFA) and Single Sign-On services, found itself grappling…
Unveiling the Threat: Microsoft’s Executive Speaks Out on State-Backed Hacking
The executive vice president of security at Microsoft, Charlie Bell, recently proposed that the company is the neighbourhood of foreign state-sponsored hackers in an interview with Bloomberg. It has certainly been true over the years that they are particularly…
Navigating Vulnerability Disclosure: Lessons from Delinea’s Secret Server Flaw
Recently, an incident involving Delinea’s Secret Server SOAP API highlighted the challenges faced by both parties in the disclosure process. Vulnerability Details A major flaw in Delinea’s Secret Server SOAP API was discovered this week, prompting security professionals to rush…
Ransomware Attack Targets Healthcare Giant, Change Healthcare
A recent cyberattack on Change Healthcare, a subsidiary of United Health, has led to a distressing data extortion situation, further complicating an already tumultuous ordeal. Let’s delve into the details to understand the gravity of the situation and its…
Iranian Hacker Group Blast Out Threatening Texts to Israelis
Handala, an Iranian cyber outfit, has claimed to have taken down the Iron Dome missile defence system and breached Israel’s radars. A major cyber attack is believed to have unfolded when the Handala hacking group, which is renowned for…
LightSpy Spyware: A Chinese Affair Targeting iPhone Users in South Asia
The LightSpy spyware has been used by cyberespionage groups to spy on users of iPhones, iPads, and other mobile devices in the South Asian region in a recent cyberespionage campaign. According to reports, the cybercriminals behind this cybercriminal campaign…
Combatting Counterfeit Drugs Online: BrandShield’s Success in Dismantling Illicit Websites
In the rapidly evolving landscape of online pharmaceuticals, the proliferation of counterfeit drugs poses a significant threat to consumer safety. Cybersecurity firm BrandShield has emerged as a stalwart defender in this battle, successfully dismantling over 250 websites selling counterfeit…
Zero-Day Exploitation of Palo Alto Networks Firewall Allows Backdoor Installation
Suspected state-sponsored hackers have exploited a zero-day vulnerability in Palo Alto Networks firewalls, identified as CVE-2024-3400, since March 26. These hackers have utilized the compromised devices to breach internal networks, pilfer data, and hijack credentials. Palo Alto Networks issued…
Are VPNs Undertaking To Oversee All Digital Security?
In the past decade, the services of Virtual Private Networks (VPNs) have drastically transformed. Once solely focused on providing secure internet connections, VPN companies are now expanding their offerings into comprehensive privacy and security suites. This shift reflects a…
Counting the Cost: $9.2 Trillion Annual Impact of Cybercrime Looms
According to a new Statista Market Insights report, cybercrime is rising at an unprecedented pace. Approximately one-third of the United States’ GDP or about 24 times Apple’s annual revenue in 2023 will be incurred as a result of cyberattacks,…
Hackers Use GitHub Search to Deliver Malware
Checkmarx, an application security firm, has discovered that threat actors are altering GitHub search results in order to infect developers with persistent malware. As part of the campaign, attackers were seen developing fake repositories with popular names and themes,…
The Rise of Weaponized Software: How Cyber Attackers Outsmart Traditional Defenses
As businesses navigate the digital landscape, the threat of ransomware looms larger than ever before. Each day brings new innovations in cybercriminal techniques, challenging traditional defense strategies and posing significant risks to organizations worldwide. Ransomware attacks have become increasingly…
National Security at Risk: The CFPB’s Battle Against Data Brokers
Data brokers work in secrecy, collecting personal details about our lives. These entities collect, and misuse our personal information without our explicit consent. The Rise of Data Brokers The Consumer Financial Protection Bureau (CFPB) has taken notice, and their proposed…
US Think Tank Struck by Cyberattack
The Heritage Foundation, a prominent conservative think tank based in Washington, DC, revealed on Friday that it had fallen victim to a cyberattack earlier in the week. The attack, which occurred amid ongoing efforts to mitigate its effects, left…
Ban the Scan – Is Facial Recognition a Risk to Civil Liberties?
There are numerous voices around the world opposing the use of facial recognition technology. Many people believe facial recognition poses a severe threat to individual privacy, free speech, racial inequality, and data security. People who oppose it have solid…
IMF Warns of Potential Bank Runs Triggered by Cyber Attacks
The International Monetary Fund (IMF) has raised concerns about the increasing frequency and severity of cyber attacks, warning that they could potentially lead to bank runs. According to the IMF, these cyber threats pose significant risks to financial stability…