A new threat actor community recently came to light. carrying out some malicious cyberattacks. The online community, labelled as ‘the Com,’ apparently consist of young skilled hackers who are carrying out sophisticated campaigns and high-profile breaches. The hackers, who are…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Gaming Giant Nintendo Embraces Passkeys for Enhanced Security and Convenience
As passkeys continue to be more widely used as authenticators for a variety of sign-in purposes, the path towards a passwordless future is being driven forward. There are reports that this authentication method will be part of Microsoft’s Windows…
TA866 Threat Actor: Python Malware Targets Tatar-language Users
Cybersecurity researchers have discovered a new Python malware that has been targeting Tatar language-speaking users. Tatar is a Turkish native language, spoken mostly by Tatars, an ethnic group based in Russia and its neighbouring nations. The Cyble-based Python malware is…
Cyberattack Responses at MGM and Caesars Required Brutal Actions
Twin assaults on MGM Resorts and Caesars Entertainment have offered an unusual perspective at what happens when two comparable organisations, under similar attack by the same threat actor, use divergent incident response techniques. Both parties in this case were…
Accurate Eye Diagnosis, Early Parkinson’s Detection
A revolutionary advancement in the realm of medical diagnostics has seen the emergence of cutting-edge AI tools. This ground-breaking technology identifies a variety of eye disorders with unmatched accuracy and has the potential to transform Parkinson’s disease early detection. According…
Two-Year Chase: FBI Relaunches Search for Cybercriminals
The usage of sophisticated e-mail schemes by hackers to hack into the systems of law firms and public relations companies is on the rise, with hacker groups targeting law firms and public relations companies in an attempt to steal…
Akira Ransomware Adapts to Linux Systems, Incorporates New Tactics and TTPs
Arika ransomware, which initially targeted Windows systems, has evolved significantly since its emergence in March. It has now expanded its scope to include Linux servers, employing a diverse set of tactics, techniques, and procedures (TTPs). A comprehensive report by…
Sandman Hackers: Threat Actors use LuaDream Info-stealing Malware
Threat actors, known as ‘Sandman,’ have recently targeted telecommunication service providers located in the Middle East, Western Europe, and South Asia. Apparently, Sandman has used info-stealing software called ‘LuaDream’ to conduct its operations. The threat actors came to light…
Report: Insider Cybersecurity Threats have Increased 40% Over the Past Four Years
A recent study disclosed that over the past four years, the average cost of an insider cybersecurity attack has increased dramatically by 40%. In addition, the average annual cost of these cyberthreats has increased over the past 12 months,…
Unlocking the Future: Passkeys, the Next Frontier in Online Security
If you’re someone who juggles numerous passwords in your daily life, you’re not alone. Despite the assistance of password managers, the increasing complexity of passwords has become a growing burden for most individuals. Gone are the days of using…
Ransomware Nightmare: FBI and CISA Issue Dire Warning on Menacing New Strain
In a security advisory, the Cybersecurity and Infrastructure Agency (CISA) of the US Department of Homeland Security and the Federal Bureau of Investigation (FBI) have warned organizations about an attack by ransomware called Snatch. A statement from the duo…
India Strengthens Crypto Crime Vigilance with Dark Net Monitor Deployment
India has made a considerable effort to prevent crypto-related criminal activity by establishing a Dark Net monitor. This most recent development demonstrates the government’s dedication to policing the cryptocurrency market and safeguarding individuals from potential risks. India has made a…
DeFi Concerns Rise as Balancer’s Web Front End Battles Ongoing Attack
The Peckshield team said that a frontend compromise of the DeFi protocol by Balancer led to the theft of roughly $240,000 in digital assets. This could indicate that the balancer was involved in the hacking of digital assets. A…
Musk’s Neuralink Seeks People for Human Trials: Brain-Implant Trials may Start Soon
Elon Musk’s startup, Neuralink, that will involve the cutting edge brain-computer interface (BCI) technology has now reached its next stage where they are now recruiting people for the technology’s first ‘human trial.’ The goal will be to link human brains…
TransUnion Refutes Data Breach Reports Amid Hacker’s Claims
Credit reporting firm TransUnion has refuted reports of a security breach after a threat actor known as USDoD purportedly leaked information stolen from the company’s network. Millions of customers and more than 65,000 businesses from 30 countries are served…
T-Mobile App Glitch Exposes Users to Data Breach
A recent T-Mobile app bug has exposed consumers to a severe data breach, which is a disturbing revelation. This security hole gave users access to sensitive information like credit card numbers and addresses as well as personal account information for…
Unveiling Decentralized Websites: Understanding the Inner Workings of the Decentralized Web
Websites, as we know them, rely on a central server to store their files, which are accessed through a specific domain name. However, this centralized system poses certain vulnerabilities, such as the risk of a single point of failure…
Clorox Cyberattack: Operations of the Cleaning-product Company Disrupted
This Monday, in a regulatory filing, cleaning-product firm Clorox (CLX) confirmed that it was hit by a cyberattack in August. The attack apparently resulted in disruption of the company’s operations, such as the production of their cleaning products. The company…
Avoid Using Master Password Across Multiple Accounts, Advises Security Experts
A recent online poll conducted by Security.org indicates that the adoption of password managers in the United States has seen a significant increase. The survey, which involved 1,051 American adults, revealed that one in three Americans now utilize password…
Cybersecurity Alert: HTTPSnoop Malware Infiltrates Telecom Giants
Cyberattacks against telecommunication service providers in the Middle East have been carried out with the use of new malware called HTTPSnoop and PipeSnoop, which allow cybercriminals to remotely control the devices infected with this malware. They have also found…