Category: CySecurity News – Latest Information Security and Hacking Incidents

An Exploit on Reddit Shows MFA’s Limitations

  It is becoming increasingly obvious that attackers are finding ways to circumvent multifactor authentication mechanisms as a result of the latest hack of a well-known company.  A threat actor sent out an email containing a link as part of…

How Would You Deal with the Inevitable Breaches of 2023?

Large-scale breaches are inevitable in 2023 as a result of cyber criminals speeding up their attacks against businesses today. In the past two months, T-Mobile, LastPass, and the Virginia Commonwealth University Health System have all faced a number of severe…

Cybercrime Utilizes Screenshotter to Find Targets in US

Organizations in Germany and the United States are targets of a new threat actor identified as TA886 that requires new, proprietary malware to spy on users and steal their data from affected devices. Proofpoint reported that it initially identified the…

Can Twitter Fix its Bot Crisis with an API Paywall?

  A newly updated Twitter policy relating to the application programming interface (API) has just been implemented, according to researchers – and the changes will have a profound impact on social media bots, both positive (RSS integration, for example) and…

Ransomware Targeting VMware ESXi Servers Rises

The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have released a joint advisory warning about an ongoing ESXiArgs ransomware campaign targeting unpatched and out-of-service or out-of-date versions of the VMware ESXi hypervisor for virtual machines (VMs). The OpenSLP…

Data Breached on Toyota Supplier Portal

Eaton Zveare, a US-based researcher proactively informed Toyota of the breach found in the Global Supplier Preparation Information Management System (GSPIMS) of the corporation. According to Zveare, the problem stemmed from installing JWT, or JSON Web Token, authentication that could have…

ChatGPT: A Potential Risk to Data Privacy

ChatGPT, within two months of its release, seems to have taken over the world like a storm. The consumer application has achieved 100 million active users, making it the fastest-growing product ever. Users are intrigued by the tool’s sophisticated capabilities,…

Cybersecurity and the Cloud in Modern Times

  Due to the advent of remote work, most companies – even those in heritage industries – have had to adopt SaaS (software as a service) and other cloud tools to remain competitive and agile in the market. Several modern…

Dingo Token Charging 99% Fee is a Scam

A major cryptocurrency scam by Dingo Token, as per researchers who discovered backdoor features intended to steal users’ money. Check Point analysts observed this fraudulent charge modification 47 times before issuing the alert. The Dingo Smart Contract’s purchase and sell…

DPRK Uses Unfixed Zimbra Devices for Spying on Researchers

State-sponsored hackers exploit unpatched Zimbra devices A recent series of compromises that exploited unpatched Zimbra devices was an operation sponsored by the North Korean government and aimed to steal intelligence from a collection of private and public medical and energy…

Telehealth Companies Monetizing and Sharing Health Data

These reports come despite company promises to prospective patients that their user data, including information about mental health and addiction treatment, will remain confidential.  Senators Amy Klobuchar, Susan Collins, Maria Cantwell, and Cynthia Lummis expressed their concern over the protection…

5 Ways to Delete Your Digital Presence

Depending on the year you were born, there is a strong probability that you have either spent a significant amount of time online or have never experienced an offline environment. You may have spent many years online or have never…

Microsoft Announces New OpenAI-Powered Bing

Microsoft has recently launched the newest version of its search engine Bing, which includes an upgraded version of the same AI technology that powers chatbot ChatGPT.  The organization announces the product launch alongside the new AI-enhanced features for its Edge…

Data: A Thorn in the Flesh for Most Multicloud Deployments

  Data challenges, such as data integration, data security, data management, and the establishment of single sources of truth, are not new. Combining these problems with multicloud deployments is novel, though. With a little forethought and the application of widespread,…

Bard: Google launches ChatGPT Rival

Sundar Pichai, CEO of Google and parent company Alphabet, announced publicly that the tech giant is launching an AI-powered chatbot named “Bard” in an effort to compete with the Microsoft-supported ChatGPT tool.   According to a blog post by Pichai, “Bard”,…

Ways in Which Online Merchants Scam Customers

When attempting to unsubscribe from an email newsletter that the user never subscribed to, one discovers a jumble of text—some of it practically grayed out—at the bottom of the message, making it virtually impossible to find an ‘unsubscribe’ link? A ‘dark…

Finland’s Most-Wanted Hacker Nabbed in France

Julius “Zeekill” Kivimäki, a 25-year-old Finnish man who has been apprehended on Friday by French police is suspected of breaching the patient records of more than 33,000 psychotherapy clients and leaking therapy notes for more than 22,000 patients online in…

Dingo Token Charging 99% Fee is a Scam

A major cryptocurrency scam by Dingo Token, as per researchers who discovered backdoor features intended to steal users’ money. Check Point analysts observed this fraudulent charge modification 47 times before issuing the alert. The Dingo Smart Contract’s purchase and sell…

Interpol is Determining How to Police the Metaverse

  Interpol, the International Criminal Police Organization, is researching how to police the metaverse, a digital world envisioned as an alternative to the real world. Jurgen Stock, the secretary general of Interpol, believes that the organization must be prepared for…

A Quick Look At The Chinese Spy Balloon Over The US

The United States military reportedly conducted a military campaign in which it shot down a Chinese surveillance balloon off the coast of South Carolina on 4th February 2023.  The Officials said that the U.S. Navy is planning to collect the…

Defending Data Breaches Through Cybersecurity

  This year the government has been working on a cybersecurity strategy that aims to thwart the risk of data breaches, which has been considered a top priority since 2020. In light of a series of ransomware attacks concerning critical…

Extortion Attempt by Former Ubiquiti Developer

  Former Ubiquiti employee Nickolas Sharp admitted to the company that he stole gigabytes of private data from the company’s network while he was overseeing the company’s cloud technology team. During this period, he misrepresented himself as an anonymous hacker…

Top Malware Threats You Should Know About

  Numerous malware variants, many of which have the ability to harm you in some way, are all over the online world. Which malware strains, however, are the most harmful and provide the greatest threat to both persons and businesses…

Nevada Ransomware: Another Feather in the RaaS Ecosystem

Resecurity which is known for its cybersecurity services including risk management, endpoint protection, and threat intelligence for large enterprises and government agencies worldwide has discovered a new ransomware family in its study tracked as “Nevada Ransomware”.  The threat actors who…

Installing Software via Google Poses Concerns

Researchers and a keystream sample of inquiries claim that while browsing Google for downloads of well-known software has always had certain dangers, in recent months it has become downright risky.  On Thursday, volunteers at Spamhaus stated that threat researchers were…

PixPirate: Brand New Brazilian Banking Trojan

A brand new Android banking trojan has attacked Brazilian financial infrastructures to execute financial scams by leveraging the PIX payments platform. Italian cyberthreat Security Company Cleafy identified the malware PixPirate at the end of 2022 and the beginning of 2023. …

‘Ransomware Year’ May Be The Most Devastating Ever

  In recent months, cyberattacks have been launched against Canada’s largest children’s hospital and a large-scale liquor board. It may be just the beginning of a year filled with major cyber and ransomware attacks on these private institutions. The reason…

20M User Data Breach Reported by PeopleConnect

Hackers stole a 2019 backup database holding the personal details of millions of users, PeopleConnect, the company behind the background check services TruthFinder and Instant Checkmate, acknowledged that they experienced a data breach. Customers can run background checks on others…

All You Need to Know About the Cisco Command-Injection Bug

A security flaw has been discovered in Cisco gear used in data centers, large enterprises, industrial facilities, and smart city power grids that could give hackers unrestricted access to these devices and wider networks.  Trellix researchers, in a report published…

JD Sports: Data of 10 Million Customers at Risk

Following a cyber-attack, sportswear chain JD Sports has confirmed that the stored data of around 10 million customers might be at risk. The company said data that “may have been accessed” by the threat actors included names, addresses, email accounts,…

Here’s How to Avoid Reddit Frauds

  Reddit is the place to go if you want to find a community that shares your interests, whether you want to read the news, speak about your hobby, ask for advice, or debate your favourite band. But if you…

Bitwarden Users Attacked via Malicious Google Ads

Utilizing Google to look up the vendor’s official Web vault login page, several customers of Bitwarden’s password management service last week reported seeing paid advertising to phishing sites that steal credentials. Google ads targeting Bitwarden users Several password managers are…

How ChatGPT Could Drive A Viral Crypto Narrative

AI Crypto: The next big thing  AI crypto tokens will surely be the next big thing in the industry, an image of Metaverse mania, Defi boom, or meme coin explosion.  ChatGPT and other AI-based technologies have been viral across social…

Russia Blocked Encrypted Email Startup Skiff

Recently, the government of Russia blocked another encrypted email provider Skiff. The government blocked Skiff after exactly three years when it had blocked similar email encrypted services including Proton Mail and Tutanota, according to a Russian digital rights organization and…

The Unheard Story of a Crippling Ransomware

When did the attack surface? Rob Miller first learned there was a problem on a Sunday morning in mid-October 2020. The databases and IT systems at Hackney Council in East London suffered from outrages. During the time, the UK was…

Britain Government With Robust Crypto Regulation

The department of Britain’s finance ministry came with robust regulations for crypto assets, following the collapse of the crypto exchange FTX last year in which millions of people lost billions of dollars.  However, regulation of crypto-assets could create a one-sized…

North Korean Cybercriminals Attempt to Steal $27M in ETH

Hacking organizations ‘Lazarus’ and ‘APT38’ supported by the North Korean government were responsible for the loss of $100 million worth of Ethereum from Harmony Horizon in June 2022.  The funds and the seizure of stolen assets were reported to the…

Northern European Criminals Copy the Lockbit Gang

  The threat group, known as LockBit, is one of the most notorious ransomware groups operating currently. As a result, they have become very active on dark web forums. In addition, they are exploiting the negative publicity created by other…

Titan-Stealer: A New Golang-based Info-Stealer Malware

Recently, a new Golang-based information stealer malware, named ‘Titan Stealer’ is being promoted by threat actors in their Telegram channel. Initial details regarding the malware were discovered by cybersecurity researcher Will Thomas in November 2022 by using the IoT search…

Influence of Digitalization on IT Admins

A SaaS software business named SysKit has released a report on the impact of digital transformation on IT administrators and the present governance environment. According to the report, 40% of businesses experienced a data breach in the last year. This…

Specifically, Targeted VMware RCE Vulnerabilities

  As of today, VMware’s vRealize Log Insight platform is vulnerable to three security vulnerabilities, that have been exposed by publicly available exploit code. This has enabled cybercriminals to weaponize these vulnerabilities in a variety of ways. Several critical unauthenticated…

Privacy Assistant Jumbo Reinvents Itself

  Jumbo, which debuted in 2019, made a promise to make the process of securing and safeguarding your privacy easier.  The iPhone and Android software would enhance your privacy settings on websites like Facebook and LinkedIn with a few touches,…

ChatGPT: When Cybercrime Meets the Emerging Technologies

The immense capability of ChatGPT has left the entire globe abuzz. Indeed, it solves both practical and abstract problems, writes and debugs code, and even has the potential to aid with Alzheimer’s disease screening. The OpenAI AI-powered chatbot, however, is…

Qwant or DuckDuckGo: Which Search Engine is More Private?

Qwant and DuckDuckGo are two privately-focused search engines that guarantee not to track your activities. Their ability to assist you in avoiding the privacy-invading methods that are all too prevalent among big search engines is one of the key components…

Password Changes are Required for LastPass Customers

  Despite being one of the most popular password managers on the market, LastPass has suffered another major breach, putting the passwords of customers risk as well as their personal information.   It was established just over a year ago that…

FBI Takes Down the Infamous Ransomware Gang’s Website

  In a statement last week, the US Department of Justice claimed to have made progress against the significant ransomware organisation known as Hive.  Since last July, the FBI has been infiltrating Hive’s computer networks, and its disruption of the…