Category: Information Security Buzz

Cloudflare Stops Over 71 Million RPS Record-Breaking DDoS Attack

Cloudflare thwarted the largest volumetric distributed denial-of-service (DDoS) attempt ever this past weekend. The company reported that it had stopped dozens of hyper-volumetric DDoS attempts over the weekend that had been directed at its clients. The most extraordinary attack exceeded…

Upsurge In ESXiArgs Ransomware Attacks, New Targets In Europe

ESXiArgs ransomware assaults have recently affected hundreds of different systems, but it’s still not known which vulnerability is being used. The number of ESXiArgs ransomware assaults has increased recently, but it’s still unclear exactly which vulnerability threat actors are utilizing.…

Beep: New Evasive Malware That Can Escape Under The Radar

Beep 4 was discovered last week, a brand-new stealthy virus with several capabilities to avoid analysis and detection by security tools. After a flurry of samples were posted to VirusTotal, an internet portal for file scanning and harmful content identification,…

RedEyes Hackers Adopts New Malware, Steals Data From Devices

The APT37 threat group targets people for intelligence gathering using the new elusive “M2RAT” malware and steganography. North Korea’s APT37, sometimes referred to as “RedEyes” or “ScarCruft,” is a hacker collective thought to be funded by the government. The hacker…

An Overview Of Essential BlueTeam Tools For Cybersecurity

Preventing data breaches and other cyberattacks is paramount in today’s digital world. Members of the BlueTeam are security experts tasked with finding and fixing vulnerabilities before they cause damage to an organization. Every cybersecurity team needs access to a variety…

Cloudflare Stops Over 71 Million RPS Record-Breaking DDoS Attack

Cloudflare thwarted the largest volumetric distributed denial-of-service (DDoS) attempt ever this past weekend. The company reported that it had stopped dozens of hyper-volumetric DDoS attempts over the weekend that had been directed at its clients. The most extraordinary attack exceeded…

Pepsi Bottling Ventures Breached Following Malware Attack

Following a network intrusion in which information-stealing malware was installed, and data was extracted, Pepsi Bottling Ventures LLC, one of the largest bottlers of Pepsi-Cola beverages in the United States, experienced a data breach. Although the security lapse occurred on…

North Korea Using Healthcare Ransomware To Fund More Hacking

The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released new cybersecurity advice that details recent tactics, methods, and procedures (TTPs) associated with North Korean ransomware attacks against public health and other critical infrastructure sectors. The report was produced jointly…

Reddit Hacked In Phishing Attack Against Its Employee

On Sunday night, the popular social platform Reddit was the victim of a cyberattack that granted hackers access to its internal business systems and provided them the chance to obtain sensitive data and source code. The company claims that the…

Hackers Bypass ChatGPT Restrictions Via Telegram Bots

Researchers revealed on Wednesday that hackers had found a means to get beyond ChatGPT’s limitations and are using it to market services that let users produce malware and phishing emails. ChatGPT is a chatbot that imitates human output by using…

20 Powerful Vulnerability Scanning Tools In 2023

Vulnerability scanning is the process of using automated tools to identify potential security weaknesses and vulnerabilities in an organization’s infrastructure. It is an essential step in maintaining the security of a system as it helps identify any potential points of…

Steps To Planning And Implementation Of Data Privacy

The digital age is engulfed with the issue of data privacy. With more personal data exchanged online, organizations need to have a plan in place to protect sensitive data. In this article, we’ll outline the steps that organizations can take…

Exploit in Dota 2 Video Game Modes Infecting Players

Security specialists have discovered four malicious Dota 2 game modes that a threat actor used to backdoor the players’ systems. Avast Threat Labs researchers discovered that the unidentified attacker built four game modes for the wildly played Dota 2 multiplayer…

Mass Ransomware Campaign Hits US & EU

According to crowdsourced data examined by CNN, a new worldwide ransomware campaign has affected at least 3,800 people, including hundreds in the US, triggering warnings from European and US cybersecurity experts. However, according to “Ransomwhere,” a network created by cybersecurity…

Bard: Google Introduces New ChatGPT Rival

Since ChatGPT’s inception in November of last year, it has experienced phenomenal growth in popularity. This growth has finally impacted Google, as it just unveiled Bard as a ChatGPT rival and alternative. Bard is now exclusively accessible to “trusted testers,”…

CERT-UA Warns Ukrainian Authorities On Remcos Cyberattacks

The Ukrainian CERT-UA (Computer Emergency Response Team) has issued a warning about potential cyberattacks against Ukrainian governmental institutions using the authorized remote access program Remcos. The agency has identified the threat actor behind the widespread phishing campaign as UAC-0050 and…

128GB Of Russian ISP Convex Data Leaked By Anonymous Hacker

Using illegal means, the Russian government has been spying on its citizens, according to 128 GB of information leaked by Caxxii, a hacktivist group affiliated with Anonymous. The biggest Russian internet provider Convex provided the hacktivist group Anonymous with 128…

Dingo Crypto Token Flagged, Charges 99% Transaction Fee

Dingo Token has been reported as a possible scam by IT security firm Check Point security researchers after discovering a feature that lets the project’s owner manipulate trading fees up to 99% of the transaction value. Check Point analysts observed…

Bermuda: Major Internet And Power Outage Strikes

The internet and phone service available in Bermuda was hampered by a major power outage that began on Friday evening. The government encouraged consumers as personnel attempted to restore service around the clock; they advised customers to “unplug all critical…

HeadCrab Malware Infects 1,200 Redis servers to Mine Monero

Since September 2021, about a thousand Redis servers have been infected by new stealthy malware meant to hunt down unprotected Redis servers online and create a botnet that mines for the Monero cryptocurrency. The malware, nicknamed HeadCrab by Aqua Security experts Nitzan…

Hacking Group: Darkweb Developers Are In High Demand

Hacker gangs frequently run like businesses; they have staff, clients, and working hours. They often employ the same strategies as legitimate tech companies and startups to find fresh individuals with improved skill sets to compete in a rising industry. The…

Data Privacy Capability Guide

Data privacy is an increasingly important concern for individuals, businesses, and governments worldwide. With the rapid expansion of digital technology and the internet, sensitive information is more vulnerable than ever to unauthorized access, theft, and misuse. As a result, organizations…

29,000 QNAP Devices Unpatched In Critical Vulnerabilities

Over twenty thousand of QNAP network-attached storage (NAS) units are awaiting a patch to fix a serious security hole that was fixed on Monday by the Taiwanese business. This SQL injection vulnerability (CVE-2022-27596) allows remote threat actors to insert malicious…

Vulnerability in F5 BIG-IP May Cause DoS and Code Execution

An authenticated attacker could use a high-severity format string vulnerability in BIG-IP to cause a denial-of-service (DoS) condition and possibly execute arbitrary code, according to a warning from F5. The security flaw, identified as CVE-2023-22374, affects iControl SOAP, an open…

Porsche Stops NFT Launch While Phishing Sites Fills The Space

Porsche stopped making a new NFT line because of weak sales and criticism from the cryptocurrency community, which gave threat actors the opportunity to fill the gap by building phishing websites that steal cryptocurrency wallet users’ digital assets. Non-fungible tokens…

HeadCrab Malware Infects 1,200 Redis servers to Mine Monero

Since September 2021, about a thousand Redis servers have been infected by new stealthy malware meant to hunt down unprotected Redis servers online and create a botnet that mines for the Monero cryptocurrency. The malware, nicknamed HeadCrab by Aqua Security experts Nitzan…

Hacking Group: Darkweb Developers Are In High Demand

Hacker gangs frequently run like businesses; they have staff, clients, and working hours. They often employ the same strategies as legitimate tech companies and startups to find fresh individuals with improved skill sets to compete in a rising industry. The…

29,000 QNAP Devices Unpatched In Critical Vulnerabilities

Over twenty thousand of QNAP network-attached storage (NAS) units are awaiting a patch to fix a serious security hole that was fixed on Monday by the Taiwanese business. This SQL injection vulnerability (CVE-2022-27596) allows remote threat actors to insert malicious…

Data Privacy Capability Guide

Data privacy is an increasingly important concern for individuals, businesses, and governments worldwide. With the rapid expansion of digital technology and the internet, sensitive information is more vulnerable than ever to unauthorized access, theft, and misuse. As a result, organizations…

Porsche Stops NFT Launch While Phishing Sites Fills The Space

Porsche stopped making a new NFT line because of weak sales and criticism from the cryptocurrency community, which gave threat actors the opportunity to fill the gap by building phishing websites that steal cryptocurrency wallet users’ digital assets. Non-fungible tokens…

Schools Are A Rising Target For Ransomware Attacks

Schools are a major target for malicious cybersecurity events and ransomware attacks. One reason is they sometimes need more resources or preparation to handle cybercriminal activity. Ransomware events negatively impact a school’s finances, parents, faculty and students. Why Are Schools…

Breaking: JD Sports Data Breach Following Cyberattack

JD Sports has issued a warning that a cyberattack that affected the company may have exposed the personal information of roughly 10 million customers, including personal contact information, such as phone and email addresses. The hack may have affected customers…

20 Million Downloads In Shady Rewards Apps Via Google Play

A new class of activity-tracking apps that have recently had significant success on Google Play, the official software store for Android, has been downloaded onto more than 20 million devices. The apps present themselves as a pedometer, fitness, and habit-building…

Netflix To Clamp Down On Password Sharing By Q1 Of 2023

Netflix wants to stop people from sharing their passwords, which will be pretty upsetting for its customer who shares passwords, especially those who don’t live with you. However, the streaming service meant business this time. The company lost 200,000 customers…

Bitwarden Password Vaults Subject Of Google Ads Phishing

Google Adwords phishing campaigns steal Bitwarden and other password managers’ vault passwords. As enterprises and consumers use unique passwords at every site, password managers must keep track of them. Unless you use KeePass, most password managers are cloud-based, allowing users…

NIST A.I. Risk Management Framework Announcement

Today, the Artificial Intelligence Risk Management Framework’s initial version was released, according to the National Institute of Standards and Technology (NIST), a leading voice in developing A.I. standards (AI RMF). The AI RMF was developed over the past 18 months…

Gartner: Zero Trust Will Not Mitigate Over Half of Attacks

With the increasing number of cyberattacks targeting large enterprises, many companies have turned to zero-trust security measures to protect their networks and data. However, a recent report from Gartner has raised concerns about the limitations of zero trust as a…

CISA: Federal Agencies Hacked Using Certain RMM Software

A “widespread cyber effort” that employed legitimate remote monitoring and management (RMM) software to spread a phishing scam affected at least two federal departments in the United States. To steal money from victims’ bank accounts through a refund scam, cybercriminals…

820K Zacks Investment Research Clients Impacted By Data Breach

The company Zacks Investment Research (Zacks) was infiltrated by hackers last year, allowing them access to 820,000 clients’ sensitive and personal data. The 1978-founded business uses cutting-edge financial data analytics systems to assist stock buyers. A threat actor entered the…

Endpoint Protection Capability Guide

In today’s digital environment, endpoint protection is more critical than ever. With the increasing use of mobile devices, laptops, and cloud services, endpoint devices are becoming the primary target for cyber-attacks. Endpoint protection is the process of securing organizational assets…

Steps To Planning and Implementation Of Endpoint Protection

Endpoint protection is a critical aspect of cybersecurity that helps organizations protect their endpoints (computers, laptops, mobile devices, servers, IoT devices, etc.) from potential threats. With the increasing use of technology in businesses, endpoints have become a prime target for…

Global State Of Cyberwarfare Study

Only one-third of UK organisations have a validated plan in place to handle cyberwarfare; and 57% have stalled or stopped digital transformation projects due to the threat of cyberwarfare Armis, the leading asset visibility and security company, today announced preliminary…

Russia’s Largest ISP Reports Highest DDoS Attacks in 2022

The year 2022 was a record-breaking year for Distributed Denial of Service (DDoS) attacks in Russia. According to a report released by Russia’s largest internet service provider (ISP), Rostelecom. The company recorded 21.5 million critical web attacks against 600 Russian businesses,…

Threat Actors Adopt Silver To Popular C2 Frameworks

What originally served as a Cobalt Strike substitute has evolved into a popular C2 platform for threat actors. All essential capabilities for adversary simulation are being offered by Sliver, an open-source, cross-platform adversary emulation/red team framework. These include staged and…

The Information Revolution – Revisiting Your DLP

Data loss prevention (DLP) has been around for well over 15 years. It’s by far the most effective tool for protecting data assets, scanning, and blocking users from sending critical files or sensitive information, such as credit card or customer…

2022 Cyber Review – Is Your Organisation Ready For 2023

Looking back at 2022 is instructive as you prepare your cybersecurity approach for 2023. Ithelps guide your security approach and helps prepare employees and systems for the yearahead. For example, some state-backed attacks focus on stealing intellectual property fromtechnology companies.…

37 Million T-Mobile API Data On Customers Stolen in Hack

Following a network intrusion by a “unidentified malicious intruder,” around 37 million T-Mobile customers had their personal information taken. Its been confirmed that data taken were customers’ addresses, phone numbers, and dates of birth were among the data taken, the…

35k PayPal Accounts Compromised In Credential Stuffing Attack

35k accounts of PayPal users were affected by a large-scale credential stuffing attack that exposed their personal information. The attack, which took place between December 6th and December 8th, 2022, was quickly detected and mitigated by the company. However, PayPal also…

Ransomware Trends In Q4 2022: Key Findings and Recommendations

Ransomware attacks continue to pose a significant threat to organizations and industries worldwide. The Q4 2022 ransomware report by ReliaQuest (formerly Digital Shadows) comprehensively analyzes the latest trends and developments in the ransomware landscape. The report is based on primary…

Mailchimp Reports Data Breach, Employees Records Exposed

Hackers gained access to an internal customer assistance and account administration tool, and the email marketing company MailChimp had another breach that gave threat actors access to the information of 133 customers. According to MailChimp, the attackers used social engineering…

FTX Says $415 Million Of Its Crypto Assets Was Hacked

FTX, a bankrupt cryptocurrency exchange, said on Tuesday to creditors that cyberattacks had stolen around $415 million in cryptocurrencies. Since FTX declared bankruptcy on November 11, its CEO John Ray has revealed in a separate statement. That $90 million in…

1,000 Ships Affected By Ransomware Attack On DNV’s Software

DNV, a Norwegian assurance and risk management firm and classification organization, has confirmed that almost 1,000 ships were affected by a recent ransomware cyberattack on its fleet management system. After the hack on its ShipManager fleet management and operations platform…

Nissan Data Breach Caused By Vendor-Exposed Database

Nissan North America has started delivering data breach notifications that there has been a disclosure of client data due to a breach at a third-party service provider. On Monday, January 16, 2023, Nissan notified the security breach to the Office…