The London branch of the Industrial and Commercial Bank of China (ICBC) recently fell victim to a ransomware attack, resulting in the theft of sensitive data. According to a report by The Register, which references information posted on the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
US Port Security Threatened by Chinese-Made Cranes, Says House Report
Despite its long-standing reliance on Chinese marine cranes, the U.S. is placing a national security risk over the cranes’ ability to be operated remotely through built-in modems, according to a staff report released Friday by the House Select Committee…
North Korean Hackers Attacking Crypto Industry, Billions at Risk
The United States Federal Bureau of Investigation (FBI) has recently highlighted a significant cybersecurity threat posed by North Korean cybercriminals targeting the web3 and cryptocurrency sectors. Why Hackers Target ETFs? The cryptocurrency industry has witnessed tremendous growth, Ether and Bitcoin…
Ford’s Latest Patent: A Step Toward High-Tech Advertising or Privacy Invasion?
Among those filed recently is one from Ford for a system that gathers driver data to personalise in-car advertisements, which raises lots of concerns over privacy. This technological advancement can collect types of information from a car’s GPS location…
TrickMo Android Trojan Abuses Accessibility Services for On-Device Financial Scam
Cybersecurity experts discovered a new form of the TrickMo banking trojan, which now includes advanced evasion strategies and the ability to create fraudulent login screens and steal banking credentials. This sophisticated malware employs malicious ZIP files and JSONPacker to…
Combating Telecom Fraud: Trai and DoT’s Joint Effort Against Spam Calls
Telecom Regulatory Authority of India (Trai) and the Department of Telecom (DoT) have jointly disconnected over 1 crore mobile connections. This initiative is part of a broader strategy to curb spam calls, reduce cybercrime, and improve the overall telecom experience…
Global Cybercrime Syndicate Falls in Singapore’s Largest-Ever Police Raid
In an announcement, the Singapore Police Force (SPF) announced the arrest of five Chinese nationals and one Singaporean for allegedly engaging in illicit cyber activities within the country and that they had been arrested. As a result of a…
Florida Healthcare Data Leak Exposes Thousands of Doctors and Hospitals
A data breach at Florida-based recruitment firm MNA Healthcare has left sensitive information of over 14,000 healthcare workers and 10,000 hospitals exposed. Discovered on June 20, 2024, by the Cybernews research team, the breach was caused by a misconfiguration…
RansomHub Ransomware: Exploiting Trusted Tools to Evade Detection
Ransomware groups continue to innovate and adapt their tactics to bypass security measures. One such group, RansomHub, reported by Malwarebytes, has recently garnered attention for its sophisticated approach to disabling Endpoint Detection and Response (EDR) systems. By leveraging Kaspersky’s TDSSKiller,…
Ransomware Actors Refused to Provide Decryptor Even After Recieving Ransom Payment
For C-suite executives and security leaders, learning that your organisation has been infiltrated by network attackers, critical systems have been locked down, and data has been compromised, followed by a ransom demand, could be the worst day of their…
London’s Transit System Suffers Through Prolonged Cyberattack; Data Security a Concern
Transport for London, the governmental body tasked with running the capital’s transit system, is battling a cyberattack that has stretched into a second week. The backbone of the transit operations remains intact and fully functional; however, many of TfL’s online…
Cryptocurrency Scams Surge in 2023, FBI Reports Record $5.6 Billion in Losses
Despite cryptocurrency no longer dominating the headlines like it did during the 2021 to 2022 boom, cybercriminals are still leveraging it to generate billions of dollars in fraudulent income every year. According to the FBI, 2023 was the most…
NoName Hackers Use RansomHub in Recent Cyber Campaigns
Despite active attacks by gangs such as the NoName ransomware group, which has targeted small and medium-sized businesses worldwide for the past three years, the group has continued to grow by using custom malware and evolving its attack methods.…
Payment Gateway Slim CD Reports Major Data Breach Affecting 1.7 Million Users
Slim CD, a leading provider of payment processing solutions, has disclosed a significant data breach that compromised the credit card and personal data of nearly 1.7 million individuals. Hackers had unauthorized access to the company’s network for almost a…
How to Protect Your Accounts from 2FA Vulnerabilities: Avoid Common Security Pitfalls
Securing an account with only a username and password is insufficient because these can be easily stolen, guessed, or cracked. Therefore, two-factor authentication (2FA) is recommended for securing important accounts and has been a mandatory requirement for online banking…
Veeam Software Issues Fixes for Exploitable Security Flaws
Security experts recommend all Veeam Backup & Replication software customers to upgrade their software immediately to address a critical, remotely exploitable vulnerability. Veeam first revealed the flaw, dubbed CVE-2024-40711, on Thursday, when it issued fixes to address 18 vulnerabilities…
Election Sabotage via Cyberattacks Increases
Several predictions have pointed out that 2024 will not only be an election year but also a year of civil rights. Security has identified an increasing trend of malicious cyber activity aimed at imperilling sovereign elections around the world…
Hackers Use SonicWall Security Flaw in Ransomware Attacks
In the latest ransomware attack, operators have started using a critical bug in SonicWall SonicOS firewall devices as an entry point for compromising business networks. The vulnerability, identified as CVE-2024-40766, is from the management access interface of the firewall…
Why Windows 11 Requires a TPM and How It Enhances Security
When Microsoft launched Windows 11 in 2021, the new operating system came with a stringent hardware requirement: the presence of a Trusted Platform Module (TPM), specifically one that meets the TPM 2.0 standard. A TPM is a secure cryptoprocessor…
Hacktivism: How Hacktivists are Using Digital Activism to Fight for Justice
What is Hacktivism? Hacktivism, a blend of hacking and activism, has become a major threat in the digital landscape. Hacktivists are driven by political, religious, and social aims, they use different strategies to achieve their goals, and their primary targets…