Tag: CySecurity News – Latest Information Security and Hacking Incidents

Data of Domestic Violence Victims Leaked in ZircoDATA Hack

  Monash Health, a Victorian public health agency, has announced that it had been impacted by the recent ZircoDATA hack.  Earlier this year in February, ZircoDATA, which provides safe document storage, data management, and digital conversion of 9,000 clients across…

New Cuttlefish Malware Hijacks Router Connections, Cloud Data Stolen

  In the ever-evolving landscape of cybersecurity threats, a new menace has emerged: Cuttlefish. This sophisticated malware targets enterprise-grade and small office/home office (SOHO) routers, posing a significant risk to both businesses and individual users alike.  Discovered by Lumen Technologies’…

Hackers are Targeting Routers Across the Globe

  When hackers identify an unsecured router, they penetrate it by installing malware that provides them persistence, the ability to launch distributed denial of service (DDoS) assaults, hide malicious data, and more. But what happens when the hackers discover a…

CISA Ask Companies to Fix Path Traversal Vulnerabilities

CISA and FBI urge companies to take patch actions  CISA and the FBI recommended software companies today to assess their products and fix route traversal security flaws before selling. Attackers can leverage path traversal vulnerabilities (also known as directory traversal)…

Insect Farmers Embrace AI to Drive Down Production Costs

  The insect farming industry, previously thought of as an industry that was in desperate need of development, has rapidly gained popularity as a practical and sustainable solution to the severe worldwide challenges of food safety, environmental degradation, and aid…

DropBox E-Signature Breach Exposes Customer Data

  DropBox has announced a breach in its DropBox Sign eSignature platform, formerly known as HelloSign. The breach, uncovered on April 24, has left customer data vulnerable, including authentication tokens, MFA keys, hashed passwords, and personal information. The breach was…

Sweden Faces Influx of DDoS Attacks Following NATO Membership

  A significant uptick in distributed denial of service (DDoS) attacks has plagued Sweden as the nation navigates its path towards joining NATO, reports network performance management provider Netscout. The onslaught commenced notably in May 2023, following a colossal 500…

Google’s Med-Gemini: Advancing AI in Healthcare

On Tuesday, Google unveiled a new line of artificial intelligence (AI) models geared toward the medical industry. Although the tech giant has issued a pre-print version of its research paper that illustrates the capabilities and methodology of these AI models,…

AI vs Human Intelligence: Who Is Leading The Pack?

  Artificial intelligence (AI) has surged into nearly every facet of our lives, from diagnosing diseases to deciphering ancient texts. Yet, for all its prowess, AI still falls short when compared to the complexity of the human mind. Scientists are…

Hackers Claim Biggest Attack On UAE in History

The United Arab Emirates government was the target of a significant data breach attack that has the cybersecurity industry on edge. The attacker, who goes by the username “UAE,” has not been recognized. Unless a ransom of 150 bitcoins (about…

Cyber Criminal Sentenced for Targeting Therapy Patients

In a recent legal case that has shaken Finland, cyber offender Julius Kivimäki, known online as Zeekill, has been sentenced to six years and three months behind bars for his involvement in a sophisticated cybercrime operation. The case revolves around…

Apple Working to Patch Alarming iPhone Issue

  Apple claims to be working rapidly to resolve an issue that resulted in some iPhone alarms not setting off, allowing its sleeping users to have an unexpected lie-in.  Many people rely on their phones as alarm clocks, and some…

Safeguarding Your Employee Data From Identity Theft

  In today’s digital age, where data breaches and cyberattacks are increasingly common, safeguarding against identity-based attacks has become paramount for organizations worldwide. Identity-based attacks, which involve the unauthorized access to sensitive information through compromised user credentials, pose significant risks…

North Korean Scammers Lure Developers with Fake Job Offers

A new cyber scam, dubbed “Dev Popper,” is preying on software developers through fake job interviews. This elaborate ruse, masquerading as genuine employment opportunities, aims to infiltrate the victim’s computer with a harmful Python backdoor, posing serious cyber threats. How…

Quantum Technology: Implications for Digital Security

  In our modern, highly connected world, where online transactions are everywhere, the looming presence of quantum computing casts a momentous shadow. Unlike classical computers, which rely on bits to process information, quantum computers leverage the peculiar properties of quantum…

Ransomware Strikes St-Jerome Company: Everest Group Suspected

  Les Miroirs St-Antoine Inc., a longstanding company in the St-Jérôme region, is grappling with the aftermath of an alleged ransomware attack orchestrated by the infamous Everest Group. Founded in 1956, Les Miroirs St-Antoine specializes in glazing and aluminum products…

Qlik Sense Servers Prone To Cactus Ransomware Threats

  Security experts are urgently warning about the vulnerability of thousands of Qlik Sense servers to potential ransomware attacks by the troubling Cactus group. Despite prior disclosures of vulnerabilities by Qlik, many organisations remain at risk due to unpatched systems.…

Defense-in-Depth: A Layered Approach for Modern Cybersecurity

  The cybersecurity landscape has shifted dramatically in recent years. Malware, phishing attempts, and data breaches have grown in frequency and scope, prompting organisations to invest more time and money into enhancing their cybersecurity strategies. Organisations should be aware of…

Why Shouldn’t You Upload Files So Readily On Your Browser?

The digital society we live in has made it abundantly clear that being cautious about online activities goes beyond avoiding suspicious links. Recent findings by cybersecurity researchers have surfaced a new ransomware threat that exploits web browsers, potentially putting users’…

Cactus Ransomware Exposes Thousands of Vulnerable Qlik Sense Servers

  Many organizations remain dangerously vulnerable to the Cactus ransomware group, despite security researchers warning of the threat five months ago. The Cactus ransomware group exploits three vulnerabilities in QlikSense’s data analytics and business intelligence platform. Two vulnerabilities were released…

5 Attack Trends Your Company Should Be Aware Of

Cybersecurity is always evolving and demands ongoing awareness Every day, Microsoft analyzes over 78 trillion security signals to gain a deeper understanding of the current threat pathways and methodologies. Since last year, we’ve seen a shift in how threat actors…

North Korean Hackers Exploit LinkedIn in Targeted Attacks

  The North Korean hacker group Lazarus has once again made headlines, this time for exploiting LinkedIn in their cyber operations. According to a report by blockchain security analytics firm SlowMist, Lazarus hackers are leveraging the professional networking platform to…

Cybercriminals Exploit Web Hosting Platforms to Spread Malware

  Cybersecurity researchers at Zscaler ThreatLabz have uncovered a concerning trend in which cybercriminals are exploiting popular web hosting and blogging platforms to disseminate malware and steal sensitive data. This sophisticated tactic, known as SEO poisoning within the realm of…

Here’s How NFTs Can Transform Asset Management

  NFTs are frequently discussed in terms of their role in digital art, but beneath the surface, there is a massive, unexplored potential for revolutionising real-world asset ownership and transaction. This possibility was the focus of a recent conversation between…

Junk Ransomware: Getting the Job Done For Hackers

Sophos detects ransomware In an April 17 analysis from its Sophos X-Ops research team, cybersecurity firm Sophos observed an increase in low-cost, primitive ransomware—a boon for aspiring threat actors and a headache for defenders. It’s far more difficult to find…

DPRK Hackers Compromise South Korean Defense Contractors

  It was reported on Tuesday that the North Korean hacking groups have been mounting “all-out” cyberattacks against South Korean defence companies, infiltrating their internal networks and stealing their technical data over the past year, South Korean police said.  According…

General Motors Under Fire for Secretly Spying on Drivers

  In a developing story that has captured public attention, General Motors (GM) finds itself embroiled in controversy amidst accusations of clandestine surveillance and unauthorised data sharing with insurance companies. The unfolding narrative, spearheaded by investigative journalist Kashmir Hill of…

Is Your VPN Safe? Or Can It be Hacked?

A virtual private network is one of the simplest ways for consumers to secure their internet activity. VPNs utilize tunneling technology to encrypt a user’s online traffic and make it unreadable to prying eyes. This additional layer of security has…

ToddyCat APT Is Siphoning Data on ‘Industrial Scale’

  ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific.  Kaspersky researchers first disclosed details regarding the elusive gang’s actions…

Where Hackers Find Your Weak Spots: A Closer Look

Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages:  Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…

MITRE Breach: State Hackers Exploit Ivanti Zero-Days

A state-backed hacking group successfully breached MITRE Corporation’s systems in January 2024 by exploiting two Ivanti VPN zero-day vulnerabilities.  The incident was detected after suspicious activity was observed on MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE), an unclassified collaborative…

Rise In Cybercrime: Dark Web Fueling Credential Attacks

  In an unsettling situation, cybercriminals are increasingly turning to credential theft as a lucrative business, aided by the rise of infostealer malware attacks. Over the past three years, these threat actors have capitalised on the opportunity, compromising millions of…

Tech Outages: Exposing the Web’s Fragile Threads

Today, technology outages have become more than mere inconveniences—they’re disruptions that ripple across industries, affecting businesses, individuals, and even our daily routines. Over 1.75 million user-reported issues flooded in from across the globe.  From WhatsApp to Greggs (the UK’s popular sausage…

New AI Speed Cameras Record Drivers on Their Phones

  New AI cameras have been deployed in vans to record drivers using their phones while driving or driving without a seatbelt.  During a 12-hour evaluation in March, South Gloucestershire Council discovered 150 individuals not wearing seatbelts and seven drivers…

GenAI Presents a Fresh Challenge for SaaS Security Teams

The software industry witnessed a pivotal moment with the introduction of Open AI’s ChatGPT in November 2022, sparking a race dubbed the GenAI race. This event spurred SaaS vendors into a frenzy to enhance their tools with generative AI-driven productivity…

Soumnibot Malware Abuses Bugs to Escape Detection

A new Android banking virus called ‘SoumniBot’ employs a less prevalent obfuscation technique, attacking flaws in the Android manifest extraction and parsing method. The approach allows SoumniBot to bypass typical Android security safeguards and steal information. Kaspersky researchers found and…

U.S. Dams Vulnerable to Cyber Threats

  The cybersecurity of America’s dams has come under intense scrutiny, with experts warning of the potential for devastating cyberattacks. Concerns were raised during a recent hearing on cybersecurity threats to critical water infrastructure, where Senator Ron Wyden expressed fears…