Recently, there’s been some buzz around New York City Mayor Eric Adams and his cellphone. Federal investigators seized his phone almost a year ago during a corruption investigation, but they can’t unlock it. Adams says he forgot his phone password,…
Category: CySecurity News – Latest Information Security and Hacking Incidents
India Disconnects 1.77 Crore Mobile Connections Using AI Tools, Blocks 45 Lakh Spoofed Calls
The Indian government has disconnected over 1.77 crore mobile connections registered with fake or forged documents using AI-powered tools, according to a recent announcement by the Department of Telecommunications (DoT). The AI-based system has identified and blocked 45 lakh…
Hackers Exploit Visual Studio Code as a Remote Access Tool, Researchers Find
In a new wave of cyberattacks, hackers are using Microsoft’s Visual Studio Code (VSCode) as a remote access tool to gain unauthorized entry into computers, according to Cyble Research and Intelligence Labs. Visual Studio, a popular integrated development environment…
Massive Global Fraud Campaign Exploits Fake Trading Apps on Apple and Google Platforms
A recent investigation by Group-IB revealed a large-scale fraud operation involving fake trading apps on the Apple App Store and Google Play Store, as well as phishing sites to deceive victims. The scheme is part of a wider investment…
MC2 Data Breach Exposes Millions: Stay Protected
Cybernews reported on September 23 that background check company MC2 Data suffered a major data breach, exposing 2.2 terabytes of sensitive information. This breach potentially affects about 100 million Americans, raising serious concerns among cybersecurity experts about the risks…
Cryptomining and Proxyjacking: The Rise of Perfctl Malware
A new and highly sophisticated malware strain has emerged, posing a significant threat to millions of Linux servers worldwide. Dubbed “perfctl,” this fileless malware employs advanced evasion techniques and exploits a staggering 20,000 misconfigurations in Linux servers. Its primary targets…
New FakeUpdate Cyber Campaign Spreads Updated WarmCookie Backdoor in France
A new wave of cyberattacks is targeting users in France, exploiting fake browser and software update prompts to spread an updated version of the WarmCookie backdoor. The campaign, dubbed “FakeUpdate,” has been linked to the SocGolish threat group, known for…
MoneyGram: No Proof Ransomware Was Behind The Recent Cyber Attack
MoneyGram, a payment provider, claims there is no proof that ransomware was behind a recent incident that caused a five-day outage in September. MoneyGram is an American payment and money transfer platform that allows customers to send and receive…
Harvard Student Uses Meta Ray-Ban 2 Glasses and AI for Real-Time Data Scraping
A recent demonstration by Harvard student AnhPhu Nguyen using Meta Ray-Ban 2 smart glasses has revealed the alarming potential for privacy invasion through advanced AI-powered facial recognition technology. Nguyen’s experiment involved using these $379 smart glasses, equipped with a livestreaming…
CosmicSting Exploit Targets Adobe Commerce and Magento Stores
In the summer of 2013, cybercriminals gained access to 5% of all Adobe Commerce and Magento stores worldwide. Large international brands have fallen victim to this attack and are among the victims. The CosmicSting attack is being conducted by…
Indian Textile Tycoon Duped of ₹7 Crore in Elaborate ‘Digital Arrest’ Scam
In a shocking incident, SP Oswal, chairman of the Vardhman Group, India, fell victim to a scam that cost him over INR 7 crore. The 82-year-old businessman was tricked into believing he was under investigation for money laundering, with…
How to Protect Your PC from Ransomware with Windows Defender
Ransomware is a significant threat that can lock users out of their own files until a ransom is paid to recover the data. CBS News recently highlighted the devastating impact of ransomware, focusing on the Scattered Spider group, which…
Global Governments Address Ransomware Threat with New Guidelines
In response to the recent publication of the Counter Ransomware Initiative (CRI), members of the initiative have provided new guidance to organizations so they can consider other possibilities before paying cyber criminals a ransom. The new guidelines aim to…
Law Enforcement From Thirty Nine Nations Team Up to Tackle Ransomware Attacks
Ransomware continues to pose significant issues for businesses and organisations around the world, and with attacks on the rise, the UK and 38 other nations have joined forces with international cyber insurance authorities to create new guidelines aimed at…
Session Hijacking Surges: Attackers Exploit MFA Gaps with Modern Tactics
As multi-factor authentication (MFA) becomes more common, attackers are increasingly resorting to session hijacking. Evidence from 2023 shows this trend: Microsoft detected 147,000 token replay attacks, marking a 111% increase year-over-year. Google reports that attacks on session cookies now…
AI-Powered Malware Targets Crypto Wallets with Image Scans
A new variant of the Rhadamanthys information stealer malware has been identified, which now poses a further threat to cryptocurrency users by adding AI to seed phrase recognition. The bad guys behind the malware were not enough in themselves,…
Inside the Dark Web: How Andariel Targets U.S. Organizations
The Andariel hacking group, a notorious entity linked to North Korea, has recently shifted its focus towards financially motivated attacks on U.S. organizations. This pivot, observed in August 2024, marks a significant change in the group’s operational strategy, raising concerns…
Phantom Domains: The New Threat to Enterprise Cybersecurity
A recent study presented at the 2024 Web Conference has identified a rising cybersecurity risk known as “phantom domains.” These phantom domains result from unregistered or placeholder dot-com links that hackers can hijack, turning them into dangerous attack vectors. …
Complicated Passwords Make Users Less Secure, Security Experts Claim
Using a variety of character types in your passwords and changing them on a regular basis are no longer considered best practices for password management. This is according to new standards published by the United States National Institute of…
DrayTek Patches 14 Vulnerabilities, Including Critical Buffer Overflow Flaws
DrayTek recently patched 14 vulnerabilities in 24 router models, including a critical buffer overflow flaw that could allow remote code execution (RCE) or denial of service (DoS). The vulnerabilities, identified by Forescout Research’s Vedere Labs and described in their…
PyPI Hosts Malicious Tools Targeting Crypto Wallets
During an investigation conducted recently, it was discovered that several malicious packages masquerading as services for recovering cryptocurrency wallets were found in the Python Package Index repository, revealing that they were spying on sensitive personal information and helping to…
Crypto Wallet App on Google Play Steals $70,000 from Mobile Users
A fake crypto wallet draining app on Google Play has stolen USD 70,000 from users, making it the first case where mobile users were specifically targeted by such a scam. The app stayed active for several months before being…
Windows 11’s Recall feature is Now Ready For Release, Microsoft Claims
Microsoft has released an update regarding the Recall feature in Windows 11, which has been on hold for some time owing to security and privacy concerns. The document also details when Microsoft intends to move forward with the feature…
Necro Trojan Uses Steganography to Attack 11 Million Devices
Necro Trojan, which has recently made headlines for its innovative use of steganography has compromised over 11 million Android devices. This blog delves into the intricacies of this malware, how it works, and its impact on cybersecurity. Understanding the Necro…
Massive Data Breach Exposes Personal Info of Millions of Americans
One-third of all the Americans’ information has been leaked by a background check company in the United States due to a disturbing data breach report. MC2 Data, which is one of the largest providers of background checks in the…
How Reachability Analysis Is Streamlining Security for Developers
Over the past few years, AI assistants have made coding easier for developers in that one is able to quickly develop and push code over to GitHub, among others. But with so much automation going on, the risk of…
Cloud Security Challenges Catch Executives Off Guard
It is no secret that cloud computing is efficient and scalable, however, they do come with a price tag. Many top executives are concerned about specific security threats faced by cloud environments, and these are also the ones they…
Avoid Evil Twin Attacks: Hackers Target Public Wi-Fi in Airports and Coffee Shops
Travelers have long been warned about the dangers of public Wi-Fi, especially in places like airports, where lax security makes them a hacker’s playground. A recent arrest in Australia has drawn attention to the resurgence of “evil twin” attacks,…
Evil Corp Faces New Sanctions and BitPaymer Ransomware Charges
The Evil Corp cybercrime group has been hit with fresh sanctions by the United States, United Kingdom, and Australia. Additionally, the U.S. has indicted a member for their involvement in BitPaymer ransomware attacks. Back in 2019, the U.S. had…
Beware of These Email Warning Signs to Stay Safe Online
Email, the backbone of communications in today’s age, also serves as a common vector for cyberattacks, particularly phishing scams. Phishing emails are designed to trick recipients into revealing sensitive information or downloading malicious software. To protect yourself, it’s crucial to…
JPCERT Shares Tips for Detecting Ransomware Attacks Using Windows Event Logs
Japan’s Computer Emergency Response Center (JPCERT/CC) recently revealed strategies to detect ransomware attacks by analyzing Windows Event Logs, offering vital early detection before the attack spreads. JPCERT’s insights focus on identifying digital traces left behind by ransomware within four…
Cybersecurity Attacks Rise in Hong Kong, Scammers Steal Money
Hong Kong has experienced a rise in cybersecurity threats, scammers are targeting individuals and businesses. A recent survey highlighted by the South China Morning Post (SCMP) reveals that nearly two-thirds of victims have suffered financial losses or wasted valuable time…
The Rise of VPNs: A Tool for Privacy or a False Promise
Today, Virtual Private Networks (VPNs) have become omnipresent. Millions around the world use VPNs, and they are often promoted by influencers as essential tools for privacy. Their rise in popularity stems from the idea that they offer online privacy…
India Launches New Initiatives to Combat Spam and Cyber Fraud
There is a renewed effort underway in the fight against spam and unsolicited commercial communication as the Department of Telecom (DoT), the telecom regulator Trai, and private telecommunication companies are launching new programs to combat cyber fraud and phishing…
Cyberattack on Maui’s Community Clinic Affects 123,000 Individuals in May
The Community Clinic of Maui, also known as Mālama, recently notified over 123,000 individuals that their personal data had been compromised during a cyberattack in May. Hackers gained access to sensitive information between May 4 and May 7, including…
Microsoft Warns of Storm-0501 Ransomware Attacks on U.S. Cloud Systems
Microsoft has uncovered a multi-stage cyberattack by the financially motivated group Storm-0501, targeting sectors in the U.S., including government, manufacturing, transportation, and law enforcement. The attackers compromised hybrid cloud environments, stealing credentials, tampering with data, and deploying ransomware. Storm-0501,…
UK and US Warn of Rising Iranian Spear Phishing Threat
The UK’s National Cyber Security Centre (NCSC) collaborated with government agencies across the Atlantic to issue a new alert regarding Iranian cyber-threats last week. The security advice, issued in collaboration with the FBI, US Cyber Command – Cyber National…
Critical Vulnerability in TI WooCommerce Wishlist Plugin Exposes 100K+ Sites to SQL Attacks
A critical vulnerability in the widely-used TI WooCommerce Wishlist plugin has been discovered, affecting over 100,000 WordPress sites. The flaw, labeled CVE-2024-43917, allows unauthenticated users to execute arbitrary SQL queries, potentially taking over the entire website. With a severity…
Pisces Introduces Innovative Tools KLogEXE and FPSpy
In a recent study, Unit 42 researchers discovered that the Sparkling Pisces (aka Kimsuky) threat group uses two malware samples. A keylogger named KLogEXE by its authors is included in the list of malware, as is a variant of…
Meta Penalized $101 Million for Storing Passwords in Plaintext, Faces Heightened EU Oversight
Meta, the parent company of Facebook, has been fined Euro 91 million (USD 101 million) by the Irish Data Protection Commission (DPC) following the revelation that the company stored millions of user passwords in plaintext. Plaintext refers to…
DCRat Malware Propagates via HTML Smuggling
Russian-speaking customers have been targeted in a new campaign aimed at distributing a commodity trojan known as DCRat (aka DarkCrystal RAT) using HTML smuggling. This is the first time the malware has been propagated via this technique, which differs…
Meta Fined €91 Million by EU Privacy Regulator for Improper Password Storage
On Friday, Meta was fined €91 million ($101.5 million) by the European Union’s primary privacy regulator for accidentally storing some user passwords without proper encryption or protection. The investigation began five years ago when Meta informed Ireland’s Data Protection…
Ransomware Gangs Targeting CEOs with Stolen Data
Ransomware gangs are now employing a terrifying tactic—using stolen data to coerce and threaten CEOs. Understanding Ransomware Attacks Ransomware is a type of malicious software that encrypts the victim’s data, rendering it inaccessible until a ransom is paid. Over the…
Embargo Ransomware Shifts Focus to Cloud Platforms
In a recent security advisory, Microsoft advised that the ransomware threat actor Storm-0501 has recently switched tactics, targeting hybrid cloud environments now to compromise the entire system of victimization. It is becoming increasingly apparent that cybercriminals are finding out…
Why SMBs Have Become Easy Prey for Cyber Criminals
The global phenomenon of cybercrime is emerging. And the soft targets in this regard are the small and medium-sized business enterprises. Day after day, while a few cyberattacks on big corporations capture the headlines in the news, many SMBs…
The Rising Threat of Payment Fraud: How It Impacts Businesses and Ways to Counter It
Payment fraud continues to be a significant and evolving threat to businesses, undermining their profitability and long-term sustainability. The FBI reports that between 2013 and 2022, companies lost around $50 billion to business email compromise, showing how prevalent this…
ChatGPT Vulnerability Exploited: Hacker Demonstrates Data Theft via ‘SpAIware
A recent cyber vulnerability in ChatGPT’s long-term memory feature was exposed, showing how hackers could use this AI tool to steal user data. Security researcher Johann Rehberger demonstrated this issue through a concept he named “SpAIware,” which exploited a…
Meta Unveils its First Open AI Model That Can Process Images
Meta has released new versions of its renowned open source AI model Llama, including small and medium-sized models capable of running workloads on edge and mobile devices. Llama 3.2 models were showcased at the company’s annual Meta Connect event.…
Shocking Ways Hackers Can Exploit Your IP Address – You’re Not as Safe as You Think
Your IP address may look like a long number row, but to a hacker, it can be an instrument of evil activity. While your exposure to an IP doesn’t pose an immediate danger per se, it is thus important to…
Growing Focus on Data Privacy Among GenAI Professionals in 2024
Recent reports published by Deloitte and Deloitte Consulting, highlighting the significance of data privacy as it pertains to Generative Artificial Intelligence (GenAI), have been widely cited. As the survey found, there has been a significant increase in professionals’ concerns…
Social Media Content Fueling AI: How Platforms Are Using Your Data for Training
OpenAI has admitted that developing ChatGPT would not have been feasible without the use of copyrighted content to train its algorithms. It is widely known that artificial intelligence (AI) systems heavily rely on social media content for their development.…
What is a Zero-Day Attack And How You Can Safeguard Against It?
The cyberthreats that are still unknown to us are the most severe. The majority of cyberdefenses rely on having prior knowledge of the attack’s nature. We just don’t know what zero days are, which is why they are so…
Homeland Security Alerts on Increasing Risks for Schools
Educators and other school professionals are playing an increasingly crucial role in providing a safe environment in which students can learn in an era where children are being targeted by increasing physical and online attacks, according to US Homeland…
Delaware Libraries Hit by Ransomware Attack, Internet Services Disrupted
Last week, Delaware’s public libraries faced a cyberattack, causing widespread disruption to computer and internet access. Signs posted at libraries informed visitors that Wi-Fi and PCs were out of service, with officials confirming a ransomware attack took down all…
Kansas Water Plant Switches to Manual Operations Following Cyberassault
The top cybersecurity agency in the United States has released a new advisory, stating that nation-states and cybercriminals remain a threat to government-run water systems. The Cybersecurity and Infrastructure Security Agency (CISA) issued the notification two days after Arkansas City,…
Protecting Your Business from Cybercriminals on Social Media
Social media has transformed into a breeding ground for cybercriminal activities, posing a significant threat to businesses of all sizes. According to recent reports, more than half of all companies suffer over 30% revenue loss annually due to fraudulent…
Mozilla Privacy: Tracking Users Without Consent
The organization behind the privacy-centric Firefox browser, has come under fire for allegedly tracking users without their consent. This controversy centers around a feature called Privacy Preserving Attribution (PPA), which has sparked a heated debate about privacy, consent, and the…
Reading Encrypted WhatsApp Messages Through Digital Forensics
In recent years, WhatsApp has become one of the most popular messaging apps in the world. End-to-end encryption is the process by which the service uses robust security for the protection of its users’ communications. The fact that messages…
Ethics and Tech: Data Privacy Concerns Around Generative AI
The tech industry is embracing Generative AI, but the conversation around data privacy has become increasingly important. The recent “State of Ethics and Trust in Technology” report by Deloitte highlights the pressing ethical considerations that accompany the rapid adoption of…
Microsoft Tightens Cloud Security After Major Breaches
In its efforts to better its cloud security, Microsoft has done much to remove any potential vulnerabilities and tightened the process of authenticating individuals. This comes after the tech giant saw several security breaches within the past year. Under…
Car Dealership Auto Canada Confirms Cyberattack, Alleged Data Leak
Car dealership company Auto Canada warned that employee data might have been leaked in a ransomware attack claimed by the Hunters International ransomware group. In August 2024, the company suffered a company was hit by a cyber-attack. While Auto Canada…
AI-Generated Malware Discovered in the Wild
Researchers found malicious code that they suspect was developed with the aid of generative artificial intelligence services to deploy the AsyncRAT malware in an email campaign that was directed towards French users. While threat actors have employed generative AI…
Fortinet Cybersecurity Breach Exposes Sensitive Customer Data
Fortinet experienced a significant cybersecurity breach involving a third-party cloud drive, where 440 GB of data was leaked by a hacker named “Fortibitch” after the company refused to pay the ransom. The breach affected about 0.3% of Fortinet’s customers,…
MoneyGram Faces Service Disruption Amid Cybersecurity Threat
A cyberattack that began on September 20 impacted MoneyGram International Inc.’s services significantly, likely due to a ransomware attack, causing significant disruptions to its services. There were reports of outages affecting company networks, and by September 23, the company…
New Mallox Ransomware Linux Variant Built on Leaked Kryptina Source Code
An affiliate of the Mallox ransomware group, also known as TargetCompany, has been observed using a modified version of Kryptina ransomware to target Linux systems, according to SentinelLabs. This development is distinct from other Linux-targeting Mallox variants, such as…
Here’s Why UltraAV Replaced Kaspersky Antivirus Software
Late last week, cybersecurity firm Kaspersky began deleting its anti-malware software from PCs in the United States. As a replacement, the company downloaded antivirus software from UltraAV. If you use Kaspersky antivirus software, you may be aware that the…
Understanding the Domain Name System (DNS): How It Works and Why It Matters
The Domain Name System (DNS) serves as a critical element of the internet’s infrastructure, acting like a phone book that translates human-friendly domain names into the numerical IP addresses that computers use to communicate. Without DNS, accessing websites would be…
Doxing: Is Your Personal Information at Risk?
Doxing is the online slang for “dropping documents,” which means revealing private information about a person or his identity to the public without his permission. It may be as simple as a person’s name, e-mail, or phone number, but…
$65 Million Settlement for Health System After Nude Photos Leak
In a recent court filing, attorneys on behalf of victims of a devastating ransomware attack in February 2023 have been awarded a settlement of $65 million after hackers uploaded nude photos of cancer patients on the internet. This settlement…
Necro Malware Attacks Google Play Store, Again. Infects 11 Million Devices
A new variant of Necro malware loader was found on 11 million Android devices through Google Play in infected SDK supply chain attacks. The re-appearance of Necro malware is a sign of persistent flaws in popular app stores like Google. …
Tech Terror in Lebanon: The Fallout of Unrestrained Aggression
The recent series of explosions in Lebanon, allegedly linked to Israel, highlights the dangers of state-driven violence and the repurposing of civilian technology for malicious purposes. With over 32 fatalities and more than 3,100 injuries, the blasts were caused…
Star Health Data Breach: Sensitive Customer Information Exposed on Telegram Chatbots
Customer data, including sensitive medical records from India’s largest health insurer, Star Health, was discovered accessible through chatbots on Telegram. This revelation comes shortly after the app, founded by Pavel Durov, was scrutinized for allegedly enabling criminal activities. Security…
Why Hackers Are Collecting Encrypted Data for Future Attacks
The cybercrime world is ever-changing, and hackers are preparing for a future quantum computer that might make current encryption techniques useless. This is called “harvest now, decrypt later,” a rising phenomenon since cybercriminals steal encrypted data with hope for…
Microsoft Issues New Warnings For Windows Users
As we approach the weekend, a new warning has been issued that a “global attack” is now targeting Windows users in multiple nations worldwide. The campaign is surprisingly basic, but it highlights the risk for the hundreds of millions…
Marko Polo Infostealer Campaigns Target Thousands Across Platforms
The cybercriminal group “Marko Polo” is behind a major malware operation, running 30 infostealer campaigns targeting a wide array of victims. Using techniques such as spear-phishing, malvertising, and brand impersonation, the group spreads over 50 malware payloads, including AMOS,…
IntelBroker Leak Claims Involve Deloitte Communications
An anonymous threat actor named IntelBroker claimed to be responsible for the leak of internal messaging from Deloitte, one of the world’s leading auditing firms. According to reports, the breach occurred in September 2024 when an Apache Solr server…
FTC Report Exposes Mass Data Surveillance by Some of the Social Media Giants in the World
According to a new report published by the Federal Trade Commission (FTC), it was found that Facebook – that has since become Meta, YouTube, WhatsApp, and others – have been highly involved in mass surveillance practices while banking in billions…
Specops Unearths Millions of Compromised VPN Passwords
The moment a password is discovered, a virtual private network (VPN) becomes public quickly. In a report published last week, password management provider Specops Software revealed 2,151,523 VPN credentials exposed by malware over the past year. One professional at…
Malvertising and Cybercrime in Online Advertising
When it comes to cyber threats, judging the threat by its name can be an imaginary endeavour. As the term “malvertising”, a portmanteau of the term “malicious advertising”, is always presented with the implication that it overlaps with ads,…
FBI Shuts Down Chinese Linked Botnet Campaign in a Joint Operation
FBI Joint Operation The FBI has cracked down on a vast botnet operation linked to a Chinese hacking group, the attackers targeted government agencies, universities, and other entities in the US. The Five Eyes intelligence alliance issued a joint report…
Port of Seattle Faces $5.9 Million Ransom Demand in Rhysida Cyberattack
The Port of Seattle is confronting a severe cybersecurity crisis as the Rhysida ransomware group demands a ransom of 100 bitcoins (approximately $5.9 million). Rhysida, which has gained notoriety for targeting organizations worldwide, released screenshots of stolen documents, claiming…
Vice Society Shifts to Inc Ransomware in Latest Healthcare Cyberattack
Ransomware incidents are increasing, with a recent attack targeting American healthcare institutions by a well-known cybercrime group. Vice Society, also known as Vanilla Tempest by Microsoft, has been active since July 2022. This Russian-speaking group has utilized various ransomware…
Nearly Half of Security Experts Believe AI is Risky
AI is viewed by 48% of security experts as a major security threat to their organisation, according to a new HackerOne security research platform survey of 500 security professionals. Their main worries about AI include the following: Leaked training…
Brave Browser: The Secure and Private Way to Surf the Web
Data is more precious in today’s digital world than ever. Companies are trying to collect as much as possible to sell it to third-party data brokers. Cybercrime is growing steadily and targeting unsuspecting victims. Addressing both issues is one…
Small Trade Businesses Urged to Strengthen Security After Total Tools Data Breach
Small trade businesses are on high alert following a significant data breach at Total Tools, a major Australian hardware retailer, which exposed sensitive information of over 38,000 customers. This breach compromised customer names, credit card details, email addresses, passwords,…
Complexity: Research Offers Solution for Healthcare Security Amid Rising Cyberattacks
In May, Ascension, a healthcare provider with a network of 140 hospitals across the U.S., suffered a major cyber-attack that disrupted its clinical operations for almost a month. Experts traced the problem to a malicious ransomware that had exploited an…
AI Development Needs Global Oversight, UN Experts State
In a time of increasing popularity for artificial intelligence (AI), the United Nations has warned that market forces should not be the sole determining factor as the technology becomes more widely used. United Nations experts called for creating tools…
Tor Project Assures Users It’s Safe Amid Controversy of Deanonymizing Users
Tor Project, A Privacy Tool Tor is a privacy software used for keeping your identity secret by rerouting your web traffic through several nodes (computers) worldwide, which makes it difficult to track where the user traffic is coming from. In…
Security Flaw in Google Cloud Document AI Could Expose Sensitive Data, Experts Warn
A critical vulnerability in Google Cloud’s Document AI service could have allowed cybercriminals to steal sensitive information from users’ cloud storage accounts and even inject malware, cybersecurity experts have warned. The flaw was first discovered by researchers at Vectra…
Global Taskforce Dismantles Encrypted Criminal Platform ‘Ghost,’ Leading to 51 Arrests
In a major breakthrough, Ireland’s police service, An Garda Síochána, collaborated with Europol and law enforcement from eight other countries to dismantle a sophisticated criminal platform known as ‘Ghost.’ This encrypted platform was widely used for large-scale drug trafficking,…
Tor Project Assures Users It’ Safe Amid Controversy of Deanonymizing Users
Tor Project, A Privacy Tool Tor is a privacy software used for keeping your identity secret by rerouting your web traffic through several nodes (computers) worldwide, which makes it difficult to track where the user traffic is coming from. In…
IT Leaders Raise Security Concerns Regarding Generative AI
According to a new Venafi survey, developers in almost all (83%) organisations utilise AI to generate code, raising concerns among security leaders that it might lead to a major security incident. In a report published earlier this month, the…
Massive Chinese Botnet Infects SOHO Routers and IP Cameras
Raptor Train, the name of the botnet that has been used by hackers for decades, has infected hundreds of thousands of small offices/home offices (SOHOs) and IoT devices in the United States and Taiwan, including government agencies, higher education…
Lumma Stealer Uses Fake CAPTCHA Pages to Distribute Malware
Cyber security professionals are warning about a new cyber-attack vector: Lumma Stealer malware that uses fake CAPTCHA tests to spread malware on Windows devices. Users are advised to maintain caution when filling out a CAPTCHA challenge. “We have identified more…
Cloudflare Outage Disrupts Website Access in Multiple Regions, Affecting Global Users
A widespread Cloudflare outage is affecting access to websites globally, including BleepingComputer. While some regions can still access these sites, others are experiencing disruptions. Cloudflare has mentioned ongoing scheduled maintenance in Singapore and Nashville, but their status page shows no…
Email Attacks Target 80% of Key Infrastructure Firms, Study Reveals
Strong security for emails is one of the top concerns of CNI dealing companies. According to a recent OPSWAT report, 80% of CNI companies reported an email-related security breach in the past year. Malicious emails are being exploited to…
Ransomware Outfits Are Exploiting Microsoft Azure Tool For Data Theft
Ransomware gangs like BianLian and Rhysida are increasingly using Microsoft’s Azure Storage Explorer and AzCopy to steal data from compromised networks and store it in Azure Blob Storage. Storage Explorer is a graphical management tool for Microsoft Azure, whereas…
The Expanding PKfail Vulnerability in Secure Boot and Its Alarming Impact
The PKfail vulnerability in Secure Boot has grown into a far-reaching security threat, affecting thousands of devices across multiple sectors. Originally believed to be a limited issue, it arises from manufacturers releasing hardware with known compromised software, allowing unauthorized…
Kawasaki Ransomware Attack: 500 GB Alleged Data Leaked, RansomHub Claims
In a recent ransomware attack that hit Kawasaki Motors Europe (KME), the company has confirmed that it suffered the breach causing major service disruptions as threat actors threatened to leak the data. “At the start of September, Kawasaki Motors Europe…
China Linked APT: Raptor Train Botnet Attacks IoT Devices
A new cyber threat has caught the attention of experts, Lumen’s Black Lotus Labs found a new botnet called Raptor Train, made of IOT and small office/home office (SOHO) devices. Experts believe that Raptor Train has links to China-based APT…