The North Korean APT43 cybercrime group, the threat intelligence firm Mandiant thinks is using cybercrime to finance espionage operations, was the subject of a report released by Mandiant. The group, also known as Hidden Cobra, has a history of participating…
Category: Information Security Buzz
New Fake Tor Browser Theft Campaign Steals Over $400,000 In Crypto
Russians and people in Eastern Europe are the targets of an increase in fake Tor Browser installations that hijack clipboards to steal cryptocurrency transactions. Although this assault is not particularly innovative or novel, Kaspersky scientists caution that it is nevertheless…
France Bans TikTok And Other ‘Fun Apps’ On Government Devices
The next nation to take action to block TikTok and Other ‘Fun Apps’ on government-controlled devices is France. The announcement of the change and its justification was made in a statement by Stanislas Guerini, the Minister of Public Transformation and…
Executive Order Limiting Usage Of Commercial Spyware Signed
On Monday, President Joe Biden of the United States issued an executive order restricting federal agencies’ use of commercial spyware. According to the order, the spyware ecosystem “poses serious security or counterintelligence threats to the United States Government or significant…
New IcedID Variants Switch From Delivering Malware To Bank Fraud
The banking Trojan program IcedID, which has recently been used to spread ransomware, has two new variations that security experts have observed being utilized in attack campaigns. The two new variations are lighter than the original since certain functionality has…
Pwn2Own Hacking Competition Awards Over $1 Million In Vancouver
Following the conclusion of Pwn2Own Vancouver 2023, competitors received $1,035,000 and a Tesla Model 3 for exploiting 27 zero-day vulnerabilities between March 22 and March 24. Security researchers targeted devices in the enterprise applications and communications, the local elevation of…
OpenAI: ChatGPT Payment Data Leak Caused By Open-Source Bug
A glitch in the open-source software of the widely-used language model, OpenAI’s ChatGPT payment, has led to a significant data leak. As per OpenAI’s confirmation, the bug resulted in ChatGPT payment inadvertently exposing its paid users’ payment details along with…
14 Million Customer Details Breached In Latitude Financial Firm
The personal information of 14 million Australians and New Zealanders was stolen as a result of a serious security breach. Systems at consumer lending company Latitude Group revealed on Monday that the information had been stolen from them after a…
Rundown Of News And Events That Happened This Week
Here is the rundown of news and events that happened this week in the world of cybersecurity. FBI Detains Owner Of Notorious Cybercrime Forum, BreachForums BreachForums founder Conor Brian Fitzpatrick, 26, of New York, was arrested by the FBI. This…
GitHub Replaces Exposed RSA SSH Key To Keep Git Operations
After unintentionally publishing its private SSH key, GitHub.com rotated it. The software development and version control provider took action out of “an excess of caution” after the private RSA key was briefly exposed. GitHub acknowledged this week that a public…
WooCommerce Payments Plugin Patches Critical Vulnerability
Developers of the popular WooCommerce payments plugin recently identified a critical security flaw that could have affected over 500,000 WordPress sites. The plugin, developed by Automattic, offers a fully integrated payment solution for WooCommerce, making it a highly attractive target for cybercriminals…
City Of Toronto Admits Data Theft, Clop Takes Blame
The City of Toronto has acknowledged today that a third-party vendor did provide unlawful access to Municipal data in the City of Toronto. Access is only permitted for files that cannot be transferred securely to a third party. A city…
New Government Cyber Security Strategy Vital For Healthcare
The Senate Homeland Security Committee cleared legislation on March 30, 2022, aimed at enhancing the cyber readiness of the U.S. healthcare sector. The proposed “Healthcare Cybersecurity Act,” or S. 3904, calls for collaboration between the U.S.The agency responsible for cybersecurity…
German and South Korean Agencies Alerts of Kimsuky’s Attacks
German and South Korean intelligence agencies have issued a joint warning against the increasing cyber-attack tactics of a North Korean hacker group called Kimsuky. The group, believed to be backed by the North Korean government, has been targeting organizations in…
Malicious ChatGPT Chrome Extension Targets Facebook Accounts
Around 9,000 people have downloaded a trojanized version of the genuine ChatGPT plugin for Chrome from the Chrome Web Store, hijacking Facebook accounts in the process. The extension is a clone of the genuine “ChatGPT for Google” Chrome add-on, which…
Windows 11 Snipping Tool Vulnerability Exposes Sensitive Data
The Windows Snipping Tool has also been discovered to be vulnerable to a serious privacy problem known as “acropalypse,” which enables users to partially recover content that has been cut out of an image. David Buchanan and Simon Aarons, two…
Google Bans Chinese App Pinduoduo Over Security Concerns
In response to worries about the security of user data, Google has revealed that it has removed the Chinese social e-commerce app Pinduoduo from its Play Store. This action coincides with US tech firms’ growing worries about the security of…
BreachForums Admin Baphomet Closes The Hacking Forum
An important update came up where BreachForums has been officially taken down. Still, Baphomet, the current BreachForums administrator, stressed that “it’s not the end” in an abrupt change of events on March 21, 2023. Baphomet stated in a post on…
NBA Alerts Fans After Hack Of The Third-Party Service Provider
A notice has been issued by the National Basketball Association (NBA) to inform its fans about a data breach incident that resulted in the theft of certain personal information. An email titled “Notice of Cybersecurity Incident” to an unspecified number…
Ferrari Reveals Data Breach After Getting Ransom Demand
Ferrari, a luxury automaker, admitted a data leak after hackers demanded a ransom. The event occurred last month, and the company is cooperating with law police to investigate. The Italian automaker said in a statement that the breach only involved…
Mandiant Zero-Day Exploitation Report 2022
This report shares key findings from the Mandiant zero-day exploitation investigation of 2022. A zero-day vulnerability, according to Mandiant, is one that was used in the real world before a fix was made available. Focusing on zero-day exploits used by…
Royal Dirkzwager Attacked By Play Ransomware Group
The Play ransomware group’s campaign, the most recent in a succession of strikes on the shipping sector, was proven to have affected the Dutch marine transport company Royal Dirkzwager. The company’s CEO, Joan Blaas, who acquired it in October after…
FBI Detains Owner Of Notorious Cybercrime Forum, BreachForums
Conor Brian Fitzpatrick, a 26-year-old native of New York, has been detained by the Federal Bureau of Investigation (FBI) for running BreachForums. Hackers sell their stolen data and confidential information on this notorious cybercrime forum. Charges of computer crime, identity…
What Is Shoulder Surfing? How Does It Affect Cybersecurity
We rely primarily on technology to protect our sensitive data, including financial information, personal information, and corporate secrets, in the extremely digital world we live in today. Our personal and sensitive information is vulnerable to being obtained by evil people…
Healthcare Firm ILS Alerts 4.2 Million People Of Data Breach
A data breach at Independent Living Systems (ILS), a Miami-based supplier of healthcare administration and managed care solutions, exposed 4,226,508 people’s data. This year’s largest revealed healthcare data breach, according to the number of affected individuals. ILS owns and manages…
New Zealand Moves To Ban TikTok On Its Parliament Devices
In response to international cybersecurity concerns, New Zealand has banned the video-sharing app Tiktok on any before the end of this month, gadgets with access to its parliament until. This makes New Zealand the most recent government to place limitations…
ChipMixer Crypto Mixer Shutdown By German & US Authorities
The European and U.S. authorities recently revealed that ChipMixer, a darknet cryptocurrency “mixing” service, had been taken down in a coordinated international operation. Between 2017 and till date, ChipMixer has been implicated in laundering more than $3 billion in cryptocurrencies for…
Microsoft Outlook Zero-Day Vulnerabilities Exposed
On Tuesday, Microsoft released a sizable number of software security updates and published advisories for two zero-day vulnerabilities that still threaten Windows OS users. The software giant from Redmond, Washington, released patches for at least 80 Windows problems and specifically…
Over $10bn Lost To Online Frauds – FBI Internet Crimes 2022 Report
The potential total financial damages as a result of cybercrime in 2022 increased from $6.9 billion in 2021 to roughly $10.2 billion, with a little reduction in the number of complaints made to the FBI. This information is only one…
Cybercriminals Devising More Tactics For Phishing Attacks
Cybercriminals are constantly improving their phishing attacks by implementing new strategies and techniques. In an effort to deceive victims, get around security controls, and stay undetected. Phishing is a form of social engineering assault that is frequently employed to obtain…
Future-Proofing Your Business Against Insider Threats
In today’s digital world, businesses face various cybersecurity threats, including malware, hacking, and phishing scams. Insider threats, unfortunately, are widely ignored. These threats could emerge from former or present staff members, professionals, or affiliates with access to sensitive company data.…
Two Young US Men Charged, Hacked Into DEA Portal In 2022
Prosecutors accused two young American men of breaking into a DEA portal in 2022 yesterday. Given that the portal was connected to the databases of 16 federal law enforcement organizations, the breach offered the criminals access to sensitive data. The…
Rubrik Admits Data Theft In GoAnywhere Zero-Day Attack
The secure file transfer platform Fortra GoAnywhere has a zero-day vulnerability that was used to steal data, according to cybersecurity company Rubrik. The company stated that it had been the target of a widespread attack employing a zero-day vulnerability targeting…
UK Security Minister Scrutinizes TikTok App Over Security Threats
The UK security minister Tom Tugendhat, the National Cyber Security Centre in the UK, is examining whether or not the Chinese-owned video app TikTok ought to be prohibited from being used on official cell phones. Because of concerns that user…
YoroTrooper Cyberspies Aims At EU Embassies, CIS Energy Orgs
Since June 2022, a new threat actor named “YoroTrooper” has been conducting cyberespionage operations against governments and energy companies in CIS nations. According to Cisco Talos, the World Intellectual Property Organization (WIPO), several European embassies, and a crucial European Union…
Researchers Investigating $197 million heist from Euler Finance
In the most recent flash loan attack to strike the sector, hackers reportedly stole $197 million in cryptocurrencies from the decentralized finance (DeFi) platform Euler Finance. Euler finance Labs did not answer requests for comment, but the attack was acknowledged…
1 Million People Affected By Zoll Medical Data Breach
Zoll Medical, a medical technology developer, recently announced that it had suffered a data breach. The company said that the breach was detected at the end of January when it found some unusual activity on its internal network. After investigation,…
The Revolutionizing Power of AI In Cybersecurity
AI in cybersecurity positively affects the rapid evolution of technology, and the threat landscape for cyber-attacks has increased. Cybercriminals are developing increasingly complex attacks, making it increasingly difficult for businesses to keep up with their security measures. This is where…
AT&T Data Breach Hits Nine Million Customer Accounts
In the AT&T data breach, nine million user accounts were compromised after a third-party marketing partner was breached. As a result of the breach, customer data, including first names, account numbers, phone numbers, and email addresses, were exposed. Nonetheless, the…
Cyberthreat on New Email By Exotic Lily
Exotic Lily is known as PROJECTOR LIBRA and TA580, which is an initial access broker (IAB). Since its start, the threat actor has been well-known in the dark web due to its connections to Diavol and Conti, two ransomware outfits.…
GRC: The Ultimate Guide To Governance, Risk, And Compliance
Do you need help keeping up with governance, risk, and compliance (GRC) requirements? With the increasing regulatory demands, managing and mitigating risks and ensuring compliance can be difficult for any organization. But GRC is super important for keeping things ethical,…
Blackbaud Will Pay $3 Million For Misleading Ransomware Disclosure
To settle their charges, Blackbaud has agreed to pay $3 million. The Securities and Exchange Commission (SEC) accused Blackbaud of failing to fully disclose the effects of a 2020 ransomware assault that affected more than 13,000 customers. Many organizations, including those…
Xenomorph Android Malware Steals Data From 400 Banks
A new automatic transfer system (ATS) framework and the capacity to steal login information for 400 banks are two of the main capabilities added to the Xenomorph Android virus in this new iteration. ThreatFabric found the initial iteration in February…
SoulSearcher Malware Released By Chinese Sharp Panda Group
Sharp Panda’s new “SoulSearcher” malware framework is targeting high-profile government agencies in Vietnam, Thailand, and Indonesia. Chinese APTs used the virus to spy on vital Southeast Asian organizations. Check Point found a spear-phishing-based malware campaign that started in late 2022…
Police Seize Netwire RAT Malware Framework, Detains Admin
After seizing the website and bringing down the infrastructure used by criminals connected to the NetWire remote access malware, international law enforcement authorities have declared another triumph over cybercriminals (RAT). A guy who allegedly ran the worldwiredlabs website, which has…
New Rise In ChatGPT Scams Reported By Fraudsters
Since the release of ChatGPT, the cybersecurity company Darktrace has issued a warning, claiming that a rise in criminals utilizing artificial intelligence to craft more intricate schemes to defraud employees and hack into organizations has been observed. The Cambridge-based corporation…
What TikTok’s Data Decision Means For Cybersecurity
TikTok has become one of the world’s most popular social media platforms in recent years. However, TikTok’s data collection policies have been scrutinized, especially regarding cybersecurity. Following pressure from European governments, TikTok recently announced a data security regime for protecting…
The US RESTRICT Act Gains More Support From Lawmakers
The RESTRICT Act has gained more support from lawmakers as concerns over the security implications of foreign technology continue to increase. The legislation aims to strengthen the US government’s ability to identify and act against potential threats from foreign technology,…
There’s A RAT In mi Note, What Am I Gonna Do?
Cybercriminals use Microsoft OneNote attachments in phishing emails to spread malware and password stealers. Phishing campaigns are one of the most typical ways criminals obtain private or sensitive information. According to Verizon Data Breach Investigations Report, 94% of the malware…
Fortinet Issues Critical RCE Vulnerability in FortiOS & FortiProxy
Fortinet has discovered a “Critical” vulnerability affecting FortiOS & FortiProxy. It enables an unauthenticated attacker to run arbitrary code or result in a service denial (DoS) to the GUI of susceptible devices via carefully crafted queries. This kind of bug…
Steps To Planning And Implementation Of Application Security
Securing your application is of utmost importance in today’s world, where cybercrime is becoming more prevalent. Application security is a critical component of software development that helps to protect against various cyber threats and attacks. Most organizations spend a lot…
FBI & Pentagon Officials Developed “Truly Unconstrained” Facial Recognition
According to hundreds of public documents, the FBI and Defense Department were developing face recognition software to identify people using street cameras and drone images. These documents reveal the government’s plans to create a reliable, sophisticated monitoring technology. The records…
Security 360 Reports Shows That Threat Actors Are Targeting BYOD And Company Devices
Jamf Threat Labs reveals that organisations are still using out-of-date software on devices, exposing them to cyber threats Jamf (NASDAQ: JAMF) today announced the release of its latest Security 360 Report analysing the threats impacting devices used in the modern workplace. A significant…
Steps To Planning And Implementation Of Cloud Security
Cloud security is essential to many businesses, offering numerous benefits, including scalability, flexibility, and cost savings. However, cloud computing also brings unique security challenges that must be addressed to protect sensitive data and ensure business continuity. The key to a…
Application Security Capability Guide
In an era where enterprises are overwhelmingly dependent on digital technologies, the significance of application security has become an indispensable constituent of every organization’s security stance. It is particularly undeniable, given the flagrant endeavors of malevolent cyber malefactors who relentlessly…
Shein App Caught Sending Clipboard Info To External Servers
An error in an earlier version of Shein’s Android app might occasionally collect and send the clipboard’s contents to a distant server. According to the Microsoft 365 Defender Research Team, the issue was found in the app’s 7.9.2 update, which…
Acer’s Sensitive Data Allegedly For Sale On A Hacker Forum
Taiwan-based computer hardware and electronics company Acer is facing another potential data breach as a threat actor claimed to have posted the company’s sensitive data for sale on a popular hacking forum. According to reports, the data allegedly contains confidential…
Cloud Security Capability Guide
The advent of cloud computing has greatly improved data management. The cloud allows companies of all sizes to centrally and conveniently store, manage, and access their data from any internet-connected device. However, as the use of cloud computing continues to…
Ransomware Hits Major Barcelona Hospital, Appointments Canceled
Authorities in Barcelona revealed on Monday that thousands of appointments had to be canceled due to a ransomware attack on the city’s primary hospital. After a Saturday attack on the Hospital Clinic de Barcelona, all of the facility’s laboratories, clinics,…
An Essential Guide To Threat Modeling Cloud Platform
Threat modeling is a proactive method for locating the points of entry on a system’s attack surface, listing the threats, and putting security measures in place. Its main objective is to guard against security lapses. An illustration of a system’s…
Law Enforcement Triumphs DoppelPaymer Ransomware Gang
With assistance from Europol, the Dutch Police (Politie), the United States Federal Bureau of Investigations, and the German Regional Police (Landeskriminalamt Nordrhein-Westfalen), the DoppelPaymer ransomware was used on February 28 to target suspected core members of the criminal organization thought…
TPM 2.0 Library Flaws May Affect Billions Of IoT Devices
Two buffer overflow flaws in the Trusted Platform Module (TPM) 2.0 specification could let attackers access or replace sensitive data, like cryptographic keys. TPM is a hardware-based solution that offers tamper-resistant operating systems and secure cryptographic services. It can be…
Russia Bans Messengers, Including WhatsApp, Telegram, And More
The regulations prohibiting the use of numerous international private messaging services in the Russian government and state entities went into effect today, according to Roskomnadzor, a Russian internet regulatory organization. Parts 8 to 10 of Article 10 of the “On…
WH Smith: Employee Data Compromised In Cyberattack
WH Smith reports a cyberattack and claims that employee data was accessed. Attackers were able to obtain the company’s data during a cybersecurity breach, according to WH Smith, which was the target of the intrusion. The store reported that information…
BlackLotus: UEFI Bootkit Bypass Secure Boot On Windows 11
Researchers from the cybersecurity company ESET in Slovakia have discovered that a UEFI bootkit known as BlackLotus is capable of getting beyond UEFI Secure Boot, a crucial platform security feature. The researchers discovered that BlackLotus makes use of an outdated…
Chick-fil-A Admits Accounts Hacked In “Automated” Attack
Chick-fil-A, an American fast food company, has acknowledged that consumers’ accounts were compromised in a months-long credential stuffing assault, giving threat actors access to personal data and the ability to use saved reward balances. Chick-fil-A started looking into what it…
White House Institutes National Cybersecurity Strategy
On Thursday, the White House instituted its National Cyber Strategy, which serves as a roadmap for how the Biden administration plans to protect the United States from dangers online. The strategy would transfer responsibility for cybersecurity from people and small…
Trezor Wallet Alerts Of Major Crypto Phishing Campaign
Trezor wallet is involved in an ongoing phishing attack that attempts to steal a target’s cryptocurrency wallet and assets by impersonating Trezor data breach alerts. Trezor is a cryptocurrency wallet that allows users to keep their cryptocurrency offline as opposed…
Pierce Transit: Bus System In Washington Admits Ransomware Attack
A public transit company ‘Pierce Transit’ operating in sections of Washington state, believed some of its systems were affected by a ransomware attack two weeks ago. The ransomware attack began on February 14 and required Pierce Transit to implement temporary…
Cybercriminals Targets Law Firms With GootLoader & FakeUpdates
According to cybersecurity company eSentire, six law firms were the targets of distinct GootLoader and SocGholish malware attacks in January and February 2023. The first effort, which targeted employees of legal firms, sought to infect victims’ machines with GootLoader, a…
Google: Client-Side Encryption Added To Gmail And Calendar
After testing the functionality in late 2022, Google has now made client-side encryption (CSE) for Gmail and Calendar generally available. According to Google’s Ganesh Chilakapati and Andy Wen, the data privacy restrictions allow “even more businesses to take charge of…
Bitdefender Releases New Decryptor For MortalKombat Ransomware
A free MortalKombat ransomware decryptor has been made available by cybersecurity company Bitdefender in order to prevent victims from having to pay a ransom to regain their files. The publication of a viable decryptor for the particular strain came shortly…
U.S. Marshals Service Looking Into Data Theft & Ransomware Attack
The theft of private law enforcement data is being looked into by the U.S. Marshals Service (USMS) as a result of a ransomware attack that hit “a stand-alone USMS system,” according to the USMS. The Justice Department’s USMS bureau supports…
London Honeypots Being Attacked 2000 Times Per Minute
Following the discovery of 91 million threats over the course of 28 days in January, security experts have warned that remote employees in the capital of the UK are under constant cyberattacks. In order to determine the extent of cyber-threat…
LastPass DevOps Engineer Breached To Steal Password Vault Data
LastPass DevOps engineers were compromised because they had access to the decryption keys. LastPass detailed an “organized second attack” in which a threat actor took data from Amazon AWS cloud storage servers for two months. Threat actors obtained partially encrypted…
Danish Hospitals Struck By Cyberattack From ‘Anonymous Sudan’
Anonymous Sudan’s DDoS strikes took down nine Danish hospitals’ websites on Sunday evening. Copenhagen’s health authority tweeted that hospital care was unaffected by the attacks despite hospital websites being down. “A couple of hours” later, the sites were back online.…
Growing Demand For Skilled Cybersecurity Workforce In This Digital Age
The importance of cybersecurity has never been higher than it is in the current digital era. The threat of online thieves and cyberattacks increases as technology develops and penetrates more aspects of our daily lives. The need for cybersecurity experts…
Dish Network Offline Following Cyberattack, Staff Disconnected
The websites and apps of Dish Network, a leading American TV company and satellite broadcaster, have unexpectedly stopped working for the past 24 hours. According to customers, the company’s call center phone numbers appear to be unavailable. A number of…
New S1deload Malware Hijacking Youtube And Facebook Accounts
A new malware campaign called S1deload Stealer has been discovered by Bitdefender’s Advanced Threat Control (ATC) team, targeting YouTube and Facebook users. The malware infects computers, hijacks social media accounts, and uses devices to mine cryptocurrency. Security researchers discovered that…
Dutch Police Arrest Three Ransomware Actors Demanding €2.5 Million
Dutch police detained three individuals on suspicion of hacking into businesses’ computer systems, extorting their management, issuing threats, and dealing in stolen data. The criminals allegedly damaged property worth millions of euros. Tens of millions of people’s private information was…
Fruit Giant Dole Suffers Ransomware Attack Affecting Activities
One of the world’s biggest growers and distributors of fresh food, Dole Food Company, has disclosed that a ransomware attack has affected its business. There is now little information available, and the business is looking into “the scope of the…
E.U. Bans TikTok From Commission Devices Over Cybersecurity
E.U. bans TikTok; the executive body of the European Union announced on Thursday that TikTok had been temporarily removed from employee phones as a cybersecurity precaution. Reflecting growing concerns from Western officials about the Chinese-owned video-sharing app. The use of…
Google Paid Security Researchers Bug Bounties Of $12 Million
With the Vulnerability Reward Program, Google last year awarded its highest bug bounty ever for an important exploit chain disclosure that the business valued at $605,000. For a total of more than 2,900 vulnerabilities in its products that security researchers…
MyloBot Botnet Spreads Globally, 50,000+ Devices Infected Daily
Most of the thousands of systems that MyloBot has seized control of are in Iran, India, the US, Indonesia, and Indonesia. A high of 250,000 unique hosts was reached in 2020. However, new research from BitSight claims that “more than…
Hydrochasma Going After The Medical And Shipping Industries
Hydrochasma, a threat actor that no one knew about before, has been going after shipping and medical labs that work on COVID-19 vaccine development and treatments. The hackers’ goal seems to be to steal intelligence, and threat hunters at Symantec,…
How To Pursue Database Encryption
Cybersecurity remains a continual battle, with data breaches occurring at PayPal and T-Mobile in the first month of 2023 alone. To combat this challenge, businesses can strengthen their security posture by looking to reinforce their data encryption measures. In most…
Delicate US Military Emails Spill Online Via Exposed Servers
On Monday, the U.S. Department of Defense shut down a server that had been leaking private emails from the American military to the public internet for the previous two weeks. The exposed server was housed on a Department of Defense…
Trellix Finds LockBit Ransomware Gang Most Apt To Leak Stolen Data
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Information Security Buzz Read the original article: Trellix Finds LockBit Ransomware Gang Most Apt To Leak Stolen…
Putin Speech Broadcast Temporarily Stopped By DDoS Attack
Several websites that were broadcasting President Putin’s speech in the state of the nation address on Tuesday were reportedly taken down by a suspected distributed denial of service (DDoS) attack. During the address, the All-Russia State Television and Radio Broadcasting…
Activision Admits Data Breach Exposing Employee And Game Info
Activision has confirmed that it had a data breach at the beginning of December 2022. Hackers got into the company’s internal systems by sending an SMS phishing text to a worker and getting them to click on a link. The…
Coinbase Employees The Subject Of SMS Phishing Attack
A phone call from a con artist was made to one of the employees who had fallen for the fraud after the SMS phishing attempt (also known as “smishing”). The largest bitcoin exchange on the planet, Coinbase, has disclosed a…
Samsung Upgrades Galaxy Devices To Zero-Click Attack Defense
To protect Galaxy smartphone users from so-called “zero-click” exploits that use malicious picture files, Samsung has created a new security solution called Samsung Message Guard. According to the Korean tech giant, its new security system will be able to identify…
RailYatri: 31 Million Users Affected On Indian Ticketing Platform
Although the RailYatri attack occurred in December 2022, the stolen data was only recently made public on a well-known hacker forum. In addition to exposing personal information, the RailYatri hack revealed the locations of millions of travelers throughout India. A…
Norway Seizes Crypto Worth $5.84 Million Stolen By Hackers
The Lazarus Group stole cryptocurrencies worth 60 million NOK (about $5.84 million) in March 2022 as a result of the Axie Infinity Ronin Bridge hack, according to a statement from the Norwegian police agency Økokrim. The agency stated in a…
Norway Seizes Crypto Worth $5.84 Millions Stolen By Hackers
The Lazarus Group stole cryptocurrencies worth 60 million NOK (about $5.84 million) in March 2022 as a result of the Axie Infinity Ronin Bridge hack, according to a statement from the Norwegian police agency Økokrim. The agency stated in a…
Twitter Limits SMS-Based 2FA To Blue Users Only
Twitter has stated that it will no longer enable SMS two-factor authentication unless you have a Twitter Blue subscription. However, there are multi-factor authentication alternatives that are more secure, which we outline below. Twitter said this week that non-Twitter Blue…
GoDaddy: Hackers Grabbed Source Code And Inserts Malware
GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers took source code and put malware on its servers. Even though the attackers had…
RedEyes Hackers Adopts New Malware, Steals Data From Devices
The APT37 threat group targets people for intelligence gathering using the new elusive “M2RAT” malware and steganography. North Korea’s APT37, sometimes referred to as “RedEyes” or “ScarCruft,” is a hacker collective thought to be funded by the government. The hacker…
FBI Investigating Cybersecurity Incident On Its Network
According to reports, the FBI is looking into harmful online behavior on the network of the agency. The federal law enforcement organization claims to have already stopped the “isolated occurrence” and is investigating its full extent and overall effects. The…
Atlassian Data Breach, Company Info Stolen From Third-Party App
Atlassian has confirmed that its network and client data are secure and that a recent data leak at a third-party vendor was the result of a compromise. Cyberscoop was the first to reveal that a hacker organization by the name…