UK Police stated that they have infiltrated a massive phishing website on the dark web that has defrauded tens of thousands of individuals, and learned that university students have turned to cyber fraud as a way to increase their…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cisco Duo raises awareness over a breach in third-party data security, revealing the exposure of SMS MFA logs.
In the ever-evolving landscape of cybersecurity, safeguarding sensitive information and ensuring secure access to corporate networks are paramount concerns for organizations worldwide. Recently, Cisco Duo, a leading provider of multi-factor authentication (MFA) and Single Sign-On services, found itself grappling…
Unveiling the Threat: Microsoft’s Executive Speaks Out on State-Backed Hacking
The executive vice president of security at Microsoft, Charlie Bell, recently proposed that the company is the neighbourhood of foreign state-sponsored hackers in an interview with Bloomberg. It has certainly been true over the years that they are particularly…
Navigating Vulnerability Disclosure: Lessons from Delinea’s Secret Server Flaw
Recently, an incident involving Delinea’s Secret Server SOAP API highlighted the challenges faced by both parties in the disclosure process. Vulnerability Details A major flaw in Delinea’s Secret Server SOAP API was discovered this week, prompting security professionals to rush…
Ransomware Attack Targets Healthcare Giant, Change Healthcare
A recent cyberattack on Change Healthcare, a subsidiary of United Health, has led to a distressing data extortion situation, further complicating an already tumultuous ordeal. Let’s delve into the details to understand the gravity of the situation and its…
Iranian Hacker Group Blast Out Threatening Texts to Israelis
Handala, an Iranian cyber outfit, has claimed to have taken down the Iron Dome missile defence system and breached Israel’s radars. A major cyber attack is believed to have unfolded when the Handala hacking group, which is renowned for…
LightSpy Spyware: A Chinese Affair Targeting iPhone Users in South Asia
The LightSpy spyware has been used by cyberespionage groups to spy on users of iPhones, iPads, and other mobile devices in the South Asian region in a recent cyberespionage campaign. According to reports, the cybercriminals behind this cybercriminal campaign…
Combatting Counterfeit Drugs Online: BrandShield’s Success in Dismantling Illicit Websites
In the rapidly evolving landscape of online pharmaceuticals, the proliferation of counterfeit drugs poses a significant threat to consumer safety. Cybersecurity firm BrandShield has emerged as a stalwart defender in this battle, successfully dismantling over 250 websites selling counterfeit…
Zero-Day Exploitation of Palo Alto Networks Firewall Allows Backdoor Installation
Suspected state-sponsored hackers have exploited a zero-day vulnerability in Palo Alto Networks firewalls, identified as CVE-2024-3400, since March 26. These hackers have utilized the compromised devices to breach internal networks, pilfer data, and hijack credentials. Palo Alto Networks issued…
Are VPNs Undertaking To Oversee All Digital Security?
In the past decade, the services of Virtual Private Networks (VPNs) have drastically transformed. Once solely focused on providing secure internet connections, VPN companies are now expanding their offerings into comprehensive privacy and security suites. This shift reflects a…
Counting the Cost: $9.2 Trillion Annual Impact of Cybercrime Looms
According to a new Statista Market Insights report, cybercrime is rising at an unprecedented pace. Approximately one-third of the United States’ GDP or about 24 times Apple’s annual revenue in 2023 will be incurred as a result of cyberattacks,…
Hackers Use GitHub Search to Deliver Malware
Checkmarx, an application security firm, has discovered that threat actors are altering GitHub search results in order to infect developers with persistent malware. As part of the campaign, attackers were seen developing fake repositories with popular names and themes,…
The Rise of Weaponized Software: How Cyber Attackers Outsmart Traditional Defenses
As businesses navigate the digital landscape, the threat of ransomware looms larger than ever before. Each day brings new innovations in cybercriminal techniques, challenging traditional defense strategies and posing significant risks to organizations worldwide. Ransomware attacks have become increasingly…
National Security at Risk: The CFPB’s Battle Against Data Brokers
Data brokers work in secrecy, collecting personal details about our lives. These entities collect, and misuse our personal information without our explicit consent. The Rise of Data Brokers The Consumer Financial Protection Bureau (CFPB) has taken notice, and their proposed…
US Think Tank Struck by Cyberattack
The Heritage Foundation, a prominent conservative think tank based in Washington, DC, revealed on Friday that it had fallen victim to a cyberattack earlier in the week. The attack, which occurred amid ongoing efforts to mitigate its effects, left…
Ban the Scan – Is Facial Recognition a Risk to Civil Liberties?
There are numerous voices around the world opposing the use of facial recognition technology. Many people believe facial recognition poses a severe threat to individual privacy, free speech, racial inequality, and data security. People who oppose it have solid…
IMF Warns of Potential Bank Runs Triggered by Cyber Attacks
The International Monetary Fund (IMF) has raised concerns about the increasing frequency and severity of cyber attacks, warning that they could potentially lead to bank runs. According to the IMF, these cyber threats pose significant risks to financial stability…
The Hidden Risk of Airport Phone Charging Stations and Why You Should Avoid It
Security experts have highlighted three compelling reasons why tourists should avoid charging their phones at airports. In light of these risks, it’s advisable to exercise caution when using public charging stations, especially at airports. Protecting your personal information should always…
Roku Security Breach Exposes Over 500,000 User Accounts to Cyber Threats
In a recent set of events, streaming giant Roku has disclosed an eminent security breach affecting over half a million user accounts. Following a recent data breach, Roku has uncovered additional compromised accounts, totaling approximately 576,000 users affected by…
Data-Stealing Malware Infections Surge by 600% in Three Years, Kaspersky Reports
The digital landscape has become increasingly treacherous, with a startling surge in data-stealing malware compromising millions of devices worldwide. According to cybersecurity firm Kaspersky, the number of devices infected with data-stealing malware has skyrocketed by over 600% in the…
Cybersecurity Crisis: Small Firms Rank Attacks as the Greatest Business Risk
As a result of the rapid development of generative artificial intelligence, cyberattackers will likely have the upper hand in the short to medium term, compounding the long-term increase in cybersecurity risks for businesses, according to a report published by…
CISA Directs Affected Agencies to Mitigate Risks Arising from Microsoft Breach
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a new emergency directive aimed at U.S. federal agencies in response to the breach of multiple Microsoft corporate email accounts by the Russian APT29 hacking group. The directive, known as…
Data Exposure Incident: iCabbi’s Security Breach
Data is the new currency, but what happens when the guardians of our privacy mess up? The recent incident involving iCabbi, a taxi software vendor, brings notice to the delicate balance between convenience and security. The Breach Unveiled On a…
Second Largest Employer Amazon Opts For Robots, Substituting 100,000 Jobs
Amazon.com Inc. is swiftly increasing the use of robotics, with over 750,000 robots functioning alongside its employees. There are 1.5 million people at the second-largest private company in the world. Even if it’s a large number, it represents a…
Nationwide Scam Targets Road Toll Users via SMS Phishing Scheme
The Federal Bureau of Investigation (FBI) has alerted the public to a widespread SMS phishing scam sweeping across the United States. The scam, which began in early March 2024, specifically targets individuals with fraudulent messages regarding unpaid road toll…
Apple Steps Up Spyware Alerts Amid Rising Mercenary Threats
It has been reported that Apple sent notifications on April 10 to its Indian and 91 other users letting them know they might have been a victim of a possible mercenary spyware attack. As stated in the company’s notification…
Navigating the Complex Landscape of Cyber Threats: Insights from the Sisense Breach and North Korean Tactics
In the intricate tapestry of cybersecurity, recent events have thrust vulnerabilities and threats into the spotlight once again. The breach of data analytics powerhouse Sisense, coupled with the emergence of novel sub-techniques utilized by North Korean threat actors, underscores…
Apple Alerts iPhone Users of ‘Mercenary Attack’ Threat
Apple issued security alerts to individuals in 92 nations on Wednesday, cautioning them that their iPhones had been targeted in a remote spyware attack linked to mercenaries. The company sent out threat notification emails, informing recipients, “Apple has detected…
Iranian Hackers Use New C2 Tool ‘DarkBeatC2’ in Recent Operation
MuddyWater, an Iranian threat actor, has used a novel command-and-control (C2) infrastructure known as DarkBeatC2 in its the most recent attack. This tool joins a list of previously used systems, including SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. In a recent…
Is Facial Biometrics the Future of Digital Security?
Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions to streamline operations and step up their security measures. One such innovation that has garnered widespread attention is facial biometrics, a cutting-edge technology encompassing face recognition…
The Silent Flaw: How a 6-Year-Old BMC Vulnerability Went Unnoticed
A six-year-old vulnerability has recently come to light, affecting Intel and Lenovo servers. Let’s delve into the details of this silent flaw and its implications. About vulnerability The vulnerability resides within the Lighttpd web server, a lightweight and efficient open-source…
300 Strikes: Fort Worth’s Battle Against the Medusa Gang
In the wake of a cyberattack on Tarrant County Appraisal District in March, the Medusa ransomware gang has claimed responsibility for the hack and has threatened the public with the threat of leaking 218 GB of the stolen data…
Offensive Security Necessitates a Data-driven Approach for CISOs
There remains a significant disparity in utilisation of resources between defensive and offensive cybersecurity technologies. When comparing the return on investment (ROI) for defensive and offensive investments, security experts discovered that offensive security routinely outperforms defensive security. For example,…
Unmasking the “Golden Top” Cybercrime Syndicate: Zambia’s Battle Against Deception
Zambia has exposed a sophisticated Chinese cybercrime syndicate that preyed on unsuspecting victims across the globe. The operation, which unfolded during a multi-agency raid, led to the apprehension of 77 individuals, including 22 Chinese nationals. This case sheds light on…
AI’s Role in Averting Future Power Outages
Amidst an ever-growing demand for electricity, artificial intelligence (AI) is stepping in to mitigate power disruptions. Aseef Raihan vividly recalls a chilling night in February 2021 in San Antonio, Texas, during winter storm Uri. As temperatures plunged to -19°C,…
X’s URL Blunder Sparks Security Concerns
X, the social media platform formerly known as Twitter, recently grappled with a significant security flaw within its iOS app. The issue involved an automatic alteration of Twitter.com links to X.com links within Xeets, causing widespread concern among users.…
E-Challan Fraud, Man Loses Rs 50,000 Despite Not Sharing Bank OTP
In a cautionary tale from Thane, a 41-year-old man, M.R. Bhosale, found himself embroiled in a sophisticated online scam after his father fell victim to a deceptive text message. The incident sheds light on the dangers of trusting unknown…
Cybercriminals Employ Obfuscation in Invoice Phishing Malware Campaigns
An array of cunning cyberattack campaigns utilizing seemingly innocuous invoices to deliver malware attacks have been uncovered by cybersecurity researchers. In this deceptive campaign, malicious Scalable Vector Graphics (SVG) file attachments are embedded in phishing emails that have been…
Windows Systems Vulnerable to Attacks Due to Critical ‘BatBadBut’ Rust Flaw
A significant security loophole within the Rust standard library has emerged, posing a threat specifically to Windows users by enabling potential command injection attacks. Designated as CVE-2024-24576 and carrying a maximum severity score of 10.0 according to the Common…
Secrets of SharePoint Security: New Techniques to Evade Detection
According to a recent discovery by Varonis Threat Labs, two new techniques have emerged that pose a significant threat to data security within SharePoint, a widely used platform for file management. These techniques enable users to evade detection and…
The Future of Quantum Computers: Challenging Space Encryption with Light
In the realm of technology and communications, the race for supremacy between quantum computers and space encryption is intensifying. While quantum computers hold the promise of unprecedented processing power, space encryption, leveraging light to beam data around, presents a…
AI Could Be As Impactful as Electricity, Predicts Jamie Dimon
Jamie Dimon might be concerned about the economy, but he’s optimistic regarding artificial intelligence. In his annual shareholder letter, JP Morgan Chase’s (JPM) CEO stated that he believes the effects of AI on business, society, and the economy would…
The Vulture in Cyberspace: A Threat to Your Finances
In the digital landscape where information flows freely and transactions occur at the speed of light, a new predator has emerged. Aptly named the “Vulture,” this cyber threat silently circles its unsuspecting prey, waiting for the right moment to strike.…
AI Integration in Cybersecurity Challenges
In the ongoing battle against cyber threats, government and corporate heads are increasingly turning to artificial intelligence (AI) and machine learning (ML) for a stronger defense. However, the companies are facing a trio of significant hurdles. Firstly, the reliance…
Threatening Emails Rattle Bengal Schools: Police Pursue Latvia Lead
In a statement announced Tuesday, the Kolkata Police said that more than 20 schools across the city have been threatened with bombs, which have been later revealed as hoaxes. According to the sender, bombs had been placed in numerous…
Look Out For SIM Swap Scams: Tips for Bitcoin Security
In today’s digitised world, safeguarding personal information and digital assets is of great importance. One emerging threat is the SIM swap scam, a sophisticated form of identity theft where fraudsters manipulate mobile carriers to transfer a victim’s phone number…
91,000 Smart LG TV Devices Susceptible to Unauthorised Remote Access
New vulnerabilities have been discovered in LG TVs that could allow unauthorised access to the devices’ root systems, possibly exposing thousands of units worldwide. The finding, made as part of Bitdefender’s continuing inspection of the popular Internet of Things…
Under Siege: Ukrainian Cyber Warriors Erase Vital Russian Military Data Center
On April 8 of this year, sources in the Ukrainian Security Service of Ukraine (SBU) told the Kyiv Independent that Ukrainian hackers, possibly linked to the SBU, destroyed a data centre used by Russian military, energy, and telecommunications companies.…
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection
Recently, Varonis Threat Labs uncovered two novel techniques that allow threat actors to sidestep SharePoint security controls, evading detection while exfiltrating files. In this blog, we delve into these techniques and explore their implications for organizations relying on SharePoint for…
India’s Businesses Under Huge Cyber Threats, Kaspersky Reported
Indian businesses are being warned about the looming threat of ransomware attacks by cybersecurity experts. These attacks not only jeopardize company data but also pose a serious risk to user information. To address this urgent issue, experts stress the importance…
LinkedIn Users Targeted in Complex Phishing Scheme
LinkedIn Users Targeted in Complex Phishing Scheme A concerning security threat has emerged for users of the professional networking platform LinkedIn. Known as the “Microsoft Two-Step Phishing Campaign,” this attack involves hackers using compromised profiles to deceive users and…
Fostering Cybersecurity Culture: From Awareness to Action
The recent film “The Beekeeper” opens with a portrayal of a cyberattack targeting an unsuspecting victim, highlighting the modern challenges posed by technology-driven crimes. The protagonist, Adam Clay, portrayed by Jason Statham, embarks on a mission to track down…
E-commerce Breach: Hackers Target Magento, Steal Payment Data
In a concerning development for e-commerce security, hackers have been discovered exploiting a critical flaw in the popular Magento platform, leaving numerous online stores vulnerable to data breaches. The vulnerability, identified as CVE-2024-20720 with a severity score of 9.1,…
Hackers Siphon 340,000 Social Security Numbers From U.S. Consulting Firm
Greylock McKinnon Associates (GMA) has discovered a data breach in which hackers gained access to 341,650 Social Security numbers. The data breach was disclosed last week on Friday on Maine’s government website, where the state issues data breach notifications.…
Posthumous Data Access: Can Google Assist with Deceased Loved Ones’ Data?
Amidst the grief and emotional turmoil after loosing a loved one, there are practical matters that need to be addressed, including accessing the digital assets and accounts of the deceased. In an increasingly digital world, navigating the complexities of…
Combatting iPhone Scams: Steps Towards Enhanced Security
The latest revelation in the realm of iPhone scams comes in the form of MFA (Multi-Factor Authentication) bombing. This sophisticated threat targeting Apple users underscores the need for heightened awareness and informed responses. Apple has promptly responded to the…
Security Advisory: Protecting Mobile Devices for UAE Residents
In a security update released by Microsoft on Thursday, 61 high-risk vulnerabilities, including critical ones, were addressed. The cyber threat actor may be able to exploit some of these vulnerabilities to gain control of a computer that has been…
The Fake E-Shop Scam Campaign Sweeping Southeast Asia, seizing users banking details
In recent years, cybercriminals have been increasingly employing sophisticated tactics to target individuals and organizations across the globe. One such alarming trend is the proliferation of fake e-shop scam campaigns, particularly prevalent in Southeast Asia. These campaigns, characterized by…
Privacy is ‘Virtually Impossible’ on iPhones, Experts Warn
Keeping your data hidden from Apple is ‘virtually impossible’, experts have warned. A groundbreaking study reveals that the default apps on iPhones, iPads, and MacBooks collect personal data even when they appear to be disabled. In a world where privacy…
The Hidden Danger of Public USB Charging Stations: What You Need to Know
Private Data of 7.5 million BoAt Users Leaked in Massive Data Breach
SurveyLama Data Breach Exposes Millions of Users’ Information
What AI Can Do Today? The latest generative AI tool to find the perfect AI solution for your tasks
Room for Error: Hotel Check-In Terminal Flaw Leads to Access Code Leak
Lazy Koala: New Cyber Threat Emerges in CIS Region
Email Security Vulnerabilities: Shocking Gaps in Malware Detection
An Unusual Tracking Feature Identified on Millions of iPhone Users
Researchers Uncover Numerous Chinese Hacker Collectives Exploiting Ivanti Security Vulnerabilities
Several threat actors with connections to China have been identified as responsible for exploiting three security vulnerabilities affecting Ivanti appliances. These vulnerabilities are identified as CVE-2023-46805, CVE-2024-21887, and CVE-2024-21893. Mandiant, a cybersecurity firm, has been monitoring these clusters of…
The High Cost of Neglecting Backups: A Ransomware Wake-Up Call
Cracking Down on Crime: Europol Shares Data on Europe’s Top Threats
Panera Bread and Omni Hotels Hit by Ransomware Outages: What You Need to Know
Privnote Secure Messaging App Is Under Phishing Threat
The Growing Threat of Remote Desktop Protocol (RDP) Attacks
Birmingham City Computers Breached by Hackers, Mayor Confirms
Data Brokers are Preparing to Challenge Privacy Legislation
LayerSlider Plugin Imperils 1 Million WordPress Sites, Urgent Fixes Mandated!
Fund Manager Outlines Digital Data as Rising Asset Class
Insights into Recent Malware Attacks: Key Learnings and Prevention Strategies
AI Developed to Detect Invasive Asian Hornets
Bing Ad Posing as NordVPN Aims to Propagate SecTopRAT Malware
Controversial Reverse Searches Spark Legal Debate
Alejandro Caceres: The Vigilante Hacker Who Took Down North Korea’s Internet
Unveiling the XZ Utils Backdoor: A Wake-Up Call for Linux Security
Heightened Hacking Activity Prompts Social Media Security Warning
Having social media software for managing users’ privacy settings, and security settings, and keeping track of recent news and marketing opportunities can provide a great way to keep in touch with family, and friends, and stay updated on recent…
Ontario Hospitals Dispatch 326,000 Letters to Patients Affected by Cyberattack Data Breach
Five hospitals in Ontario, which fell victim to a ransomware attack last autumn, are initiating a mass notification effort to inform over 326,000 patients whose personal data was compromised. The cyber breach on October 23, targeted Bluewater Health, Chatham-Kent Health…
Rise of Hacktivist Groups Targeting OT Systems
Recent research from Waterfall Security Solutions has revealed important insights into the changing nature of cyberattacks on Operational Technology (OT) organizations. One key finding is the rise of hacktivist groups as major players in targeting OT systems. Additionally, the study…
Prudential Financial Notifies 36,000 Victims of Data Leak
Last Friday, Prudential Financial began informing over 36,000 people of a data incident that occurred in early February 2024. The breach, first disclosed in a regulatory filing with the SEC in February, occurred on February 4 and was purportedly…
Sensitive Documents Vanish Under Mysterious Circumstances from Europol Headquarters
A significant security breach has impacted the European Union’s law enforcement agency, Europol, according to a report by Politico. Last summer, a collection of highly confidential documents containing personal information about prominent Europol figures vanished under mysterious circumstances. The…
Malware Targets End-of-Life Routers and IoT Devices
A recent investigation by Black Lotus Labs team at Lumen Technologies has revealed a concerning trend in cybercriminal activity targeting end-of-life (EoL) routers and IoT devices. The research sheds light on a sophisticated campaign utilising updated malware known as TheMoon, which…
Microsoft’s Priva Platform: Revolutionizing Enterprise Data Privacy and Compliance
Microsoft has taken a significant step forward in the realm of enterprise data privacy and compliance with the expansive expansion of its Priva platform. With the introduction of five new automated products, Microsoft aims to assist organizations worldwide in…
Defending Against IoT Ransomware Attacks in a Zero-Trust World
Defending Against IoT Ransomware Attacks in a Zero-Trust World In our interconnected digital landscape, the proliferation of Internet of Things (IoT) devices has revolutionized how we live and work. From smart homes to industrial automation, IoT devices play a pivotal…
1.3 Million Customers Affected: Pandabuy Grapples with Data Breach Fallout
A data breach allegedly occurred on Sunday at Pandabuy, an online store that aggregates items from Chinese e-commerce sites. As a result, 1,348,307 accounts were affected. A large amount of information has been leaked, including user IDs, first and…
OWASP Reveals Data Breach Stemming from Wiki Misconfiguration
The OWASP Foundation has recently made public a data breach incident where the resumes of certain members were inadvertently made accessible online due to a misconfiguration of its previous Wiki web server. OWASP, which stands for Open Worldwide Application…
Smishing Surge: Tactics, Threats, and ‘The Com’
Recently, what we are observed is that enterprises facing a persistent threat from social engineering tactics aimed at acquiring login credentials for crucial systems like Identity and Access Management (IAM), cloud resources, and Single Sign-On (SSO) platforms. Successful breaches through…
DOD Officially Launches New Cyber Policy Office
The Office of the Assistant Secretary of Defence for Cyber Policy has been formally constituted, the Pentagon announced in a statement last week. Congress directed the Pentagon to set up the office, elevating cyber policy within the office of…
Macs Vulnerable to Info-Stealing Malware via Ads and Fake Software
As cyber threats continue to evolve, Mac users are increasingly finding themselves in the crosshairs of malicious actors. In recent developments, a new strain of malware has emerged, posing a significant risk to Mac users worldwide. This malware, designed…
Despite Mounting Cyberattacks, Analysts Uncover The Primary Challenge
Data security has become a necessity since the world is completely dependent on the Internet for everything, including the most basic things. Security challenges have become increasingly important with the amount of sensitive data the Internet carries, including users’…
Google’s Incognito Mode: Privacy, Deception, and the Path Forward
In a digital age where privacy concerns loom large, the recent legal settlement involving Google’s Incognito mode has captured attention worldwide. The tech giant, known for its dominance in search, advertising, and web services, has agreed to delete billions of…
Are YouTube Game Cracks Hiding Malware?
Recently, cybersecurity researchers have unearthed a disturbing trend: threat actors are exploiting YouTube to distribute malware disguised as video game cracks. This alarming course of action poses a significant risk to unsuspecting users, especially those seeking free software downloads. According…
Google Messages’ Gemini Update: What You Need To Know
Google’s latest update to its Messages app, dubbed Gemini, has ignited discussions surrounding user privacy. Gemini introduces AI chatbots into the messaging ecosystem, but it also brings forth a critical warning regarding data security. Unlike conventional end-to-end encrypted messaging…