Photo by kalhh on Pixabay In an increasingly digital world, the threat of cyber-attacks is more prevalent than ever. This article delves into an alarming case of cybersecurity breach involving a popular dating platform, which led to over 620…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Data Privacy Concerns Surround Period Tracking Apps
Period tracking apps have become increasingly popular among women seeking to monitor their menstrual cycles, plan pregnancies, or simply stay informed about their health. However, recent reports have raised serious concerns about the handling of user data by these apps.…
North Korean Threat Actors Stole $41 Million in Online Casino Heist
This week, cyber attackers set their sights on Stake.com, an online casino game and sports betting platform. They successfully made away with around $41 million in cryptocurrencies. The FBI has pinpointed North Korea and its infamous state-supported hacking group,…
Mac Users Under Attack: Malvertising Campaign Distributing Atomic Stealer Malware
An updated version of macOS stealer malware called Atomic Stealer (or AMOS) is being distributed through a new malvertising campaign. The authors of the program appear to be actively maintaining and updating malware. When the creators of AMOS found…
W3LL Store: Unmasking a Covert Phishing Operation Targeting 8,000+ Microsoft 365 Accounts
A hitherto undisclosed “phishing empire” has been identified in a series of cyber attacks targeting Microsoft 365 business email accounts spanning six years. According to a report from cybersecurity firm Group-IB, the threat actor established an underground market called…
Check Point to Acquire Cyber Startup Atmosec to Boost Its SaaS Security Offering
Check Point Software intends to acquire an early-stage SaaS security business founded by former Armis leaders in order to anticipate and combat malicious application threats. According to Vice President of Product Management Eyal Manor, the Silicon Valley-based platform security…
North Korean Hackers Steal Crypto to Fund ‘Nuclear Weapon Program’
North Korea based hackers have reportedly carried out another attack, stealing hundreds of millions in crypto in order to fund their regime’s ‘nuclear weapon program.’ According to blockchain intelligence company TRM Labs, almost 20% of all cryptocurrency stolen this year,…
The Rise of AI-Powered Narcissism: Exploring the Impact of Digital Clones on Our Psychology
Are we entering a new age of AI-powered narcissism? This is a question that has been raised by Dazed in their recent article. The rise of AI-powered clones and their potential impact on our psychology is a topic that has…
Privacy Class Action Targets OpenAI and Microsoft
A new consumer privacy class action lawsuit has targeted OpenAI and Microsoft, which is a significant step. This legal action is a response to alleged privacy violations in how they handled user data, and it could be a turning point…
Apple Patch Zero-Day Flaws Exploited for Pegasus Spyware on iPhones
On Thursday, Apple urgently issued security patches for iOS, iPadOS, macOS, and watchOS. These updates were released in response to the exploitation of two previously unknown vulnerabilities in the wild. These flaws were utilized to deploy NSO Group’s Pegasus spyware,…
UK Military Data Breach via Outdated Windows 7 System
A Windows 7 machine belonging to a high-security fencing company was the stunning weak link in a shocking cybersecurity incident that exposed vital military data. This hack not only underlines the need for organizations, including those that don’t seem to…
Dallas Ransomware Attack: Hackers Steal 800K City Files
Hackers who targeted the City of Dallas in the alleged ransomware attack have stolen nearly 1.2 terabytes of data, which equals a sum of 819,000 files, reports City officials. City’s Chief Information Officer Bill Zielinski describes that the threat actors…
How to Protect Your Personal Financial Information from Data Brokers
In today’s digital age, personal information is a hot commodity. Data brokers buy and sell this information, often without our knowledge or consent. This can include sensitive financial information, which can be used for identity theft or other fraudulent activities.…
UK’s Nuclear Submarine Base Faces Unprecedented Threats: Russia Implicated in Shocking Incidents
A Russian-linked group of hackers, which has reportedly obtained hundreds of pages of information about critical sites such as HMNB Clyde, which houses the UK’s nuclear weapons arsenal, is believed to have targeted the nuclear weapons arsenal at the…
Automakers can Exploit Your Private Data However They Want
It turns out that the answer to the question of which devices have the worst user privacy policies may be waiting for you outside. The Mozilla Foundation said in a report released on Wednesday that cars are “the official…
Okta: Cyber Attackers Target IT Help Desks to Compromise Super Admin and Disable MFA
Okta, a leading identity and access management firm, has issued a warning regarding a series of social engineering attacks aimed at IT service desk agents of U.S.-based clients. The attackers’ primary objective was to deceive these agents into resetting…
FBI Duck Hunt Operation Against Qakbot Resurgence
Last week, a pernicious and multifunctional malware was silenced as a result of Operation “Duck Hunt,” a collaborative effort led by the FBI. This operation successfully extracted the malicious code from 700,000 compromised systems, forcibly severing their connection to…
Threat Actors Exploits SQL Servers to Deploy FreeWorld Ransomware
Threat actors are exploiting vulnerable Microsoft SQL servers, deploying Cobalt Strike and a ransomware strain named FreeWorld. According to cybersecurity firm Securonix, the campaign is notable for the way its infrastructure and toolkit are used. The firm has named the…
Golfing Community Shaken as Calloway Data Breach Hits One Million Fans
At the start of August, Topgolf Callaway (Callaway) was hacked by hackers, exposing the sensitive account and personal information of over 1 million customers to the dangers of identity theft. There are many manufacturers and retailers of various types…
The Future of Health and Medicine: The Impact of Generative AI
Generative AI is a rapidly growing field that has the potential to revolutionise the way we approach health and medicine. With the ability to generate new data, insights, and predictions, generative AI is inspiring dreams of a health data revolution. …
United Airlines Claims to Have Patched the Technical Glitch That Briefly Held Up Its Flights
United Airlines said Tuesday that it has fixed a technical fault that had led it to suspend worldwide departures, briefly crippling one of America’s largest carriers on a busy travel day. According to federal authorities, United crews were unable…
Electoral Commission Fails Cyber-Security Test Amidst Major Data Breach
The Electoral Commission has acknowledged its failure in a fundamental cyber-security assessment, which coincided with a breach by hackers gaining unauthorized access to the organization’s systems. A whistleblower disclosed that the Commission received an automatic failure during a Cyber…
Russian Cyber-Attacks and the Looming Threat of WW3
Russian cyberattacks have been on the rise alarmingly over the past few years, raising concerns among specialists about the possible repercussions. The threat that these cyberattacks will start a worldwide battle, commonly referred to as World War III, looms menacingly…
SaphhireStealer: New Malware in Town, Possess More Capabilities
A new malware called ‘SapphireStealer’ has been observed by Cisco Talos researchers. The malware came to light in December 2022 in Cisco’s public release, where they witnessed it frequently in public malware repositories, stealing browser credential databases and files containing…
Revolutionizing the Future: How AI is Transforming Healthcare, Cybersecurity, and Communications
Healthcare Artificial intelligence (AI) is transforming the healthcare industry by evaluating combinations of substances and procedures that will improve human health and thwart pandemics. AI was crucial in helping medical personnel respond to the COVID-19 outbreak and in the development…
Taming Your Android: A Step-Step Guide to Restricting Background App Data
It is no secret that Android smartphones are the most popular devices among the young generation because of their ability to give you unlimited possibilities. It is unfortunate that beneath the chic surface of this device lurks an elusive…
China’s Temu App Pose a Security Threat to Online Shoppers
Apps rule the contemporary era. Each aspect of our lives, from communication to e-commerce, appears to be dependent on digital platforms that promise convenience at the push of a button. A newbie among these apps has recently attracted a…
Freecycle Data Breach: Urgent Password Update Required
Freecycle, a well-known website for recycling and giving away unwanted stuff, recently announced a huge data breach that has affected millions of its users. This news has shocked the internet world. Concerns over the security of personal information on the…
Fortifying Cybersecurity for Schools as New Academic Year Begins
School administrators have received a cautionary alert regarding the imperative need to fortify their defenses against potential cyberattacks as the commencement of the new academic year looms. The National Cyber Security Centre has emphasized the necessity of implementing “appropriate…
The Rise of Chaes Malware: A Threat to Financial and Logistics Industries
The world of cybersecurity is constantly evolving, with new threats emerging on a regular basis. One such threat is the Chaes malware, which has recently undergone major overhauls, making it even more dangerous to the financial and logistics industries. What…
AI Development May Take a Toll on Tech Giant’s Environment Image
The Reputation of tech giants as a safe investment for investors interested in the environment, social issues, and governance as well as consumers who value sustainability is clashing with a new reality – the development and deployment of AI capabilities. …
How to Identify and Overcome Blockchain Fatigue
With its plethora of uses and potential for transformation, the blockchain ecosystem has unquestionably changed how current technology and business processes are planned. Blockchain technology promised dramatic changes in data integrity, transparency, and peer-to-peer interactions because it was based…
Tech Giants Grapple Russian Propaganda: EU’s Call to Action
In a recent study published by the European Commission, it was found that after Elon Musk changed X’s safety policies, Russian propaganda was able to reach a much wider audience, thanks to the changes made by Musk. After an…
Vietnamese Cybercriminals Exploit Malvertising to Target Facebook Business Accounts
Cybercriminals associated with the Vietnamese cybercrime ecosystem are exploiting social media platforms, including Meta-owned Facebook, as a means to distribute malware. According to Mohammad Kazem Hassan Nejad, a researcher from WithSecure, malicious actors have been utilizing deceptive ads to target…
BitBrowser Hackers Launder 70.6% of Stolen Funds
Hackers were able to transfer a remarkable 70.6% of the stolen BitBrowser cash through the eXch crypto mixer in a recent cyber robbery that startled the cryptocurrency world. Concerns regarding the security of digital assets and the increasing sophistication of…
Defending Against Snake Ransomware: Here’s All You Need to Know
A snake is not just a carnivorous reptile that poses a physical threat; it can also refer to a malicious software known as ransomware, capable of causing significant harm to your computer system. Similar to its namesake, this ransomware…
Russian Military Hackers Take Aim at Ukrainian Soldiers’ Battle Plans
On Thursday, the United States and its allies issued a warning, revealing that Russian military hackers have been actively pursuing Ukrainian soldiers’ mobile devices. Their objective is to pilfer critical battlefield data, which could potentially bolster the Kremlin’s efforts…
FBI Operation: Quakbot Botnet Dismantled, Preventing Severe Ransomware Attacks
A global law enforcement operation executed by US investigators reportedly took down and dismantled the Qakbot botnet, preventing the severe blow of a ransomware scourge. On August 29, the Justice Department and FBI confirmed to had taken down Qakbot by…
Google’s Quest for AI Dominance: Challenges and Opportunities
Google’s Diversification and Investment in AI In its early days, Google was primarily known as a search engine, but it has since diversified into many areas of tech and dominates some of them to an extent that sometimes troubles anti-competition…
Chastity Device Designer Exposes Customers’ Private Data Due to Server Vulnerabilities
A security researcher found that users of a company’s chastity device ran the risk of having their private information exposed. The researcher was able to access over 10,000 users’ email addresses, plaintext passwords, home locations, IP addresses, and GPS…
The Race to Train AI: Who’s Leading the Pack in Social Media?
A growing number of computer systems and data sets consisting of large, complex information have enabled the rise of artificial intelligence over the last few years. AI has the potential to be practical and profitable by being used in…
Sea Sides Conference: Interviewing Prashant Kv and Parveen
1) Could you please start by telling us a bit about yourself and your background? Prashant: Hi, my name is Prashant KV. I have been working in information security for more than 15 years. I started my career as…
Key Group Ransomware: Free Decryptor Released
A free decryptor to tackle the infamous Key Group ransomware has been launched, making a huge contribution to the fight against cybercrime. This finding represents a win for cybersecurity professionals and victims alike, offering some hope to those who have…
Default Passwords Lead to Hacking Incidents Among LogicMonitor Customers
Some customers of LogicMonitor, a network security firm, have been compromised by hacking attacks due to their use of default passwords. A spokesperson representing LogicMonitor has officially confirmed the existence of a “security incident” that is affecting a segment…
New Privacy Policy: X Plans on Collecting Users’ Biometric Data
According to a new privacy policy introduced by X (formerly known as Twitter), it will soon be collecting its users’ biometric data. The policy says that the company intends to compile individuals’ employment and educational histories. According to the policy…
Rare Technique Deployed by Android Malware to Illicitly Harvest Banking Data
Trend Micro, a cybersecurity research firm, has recently unveiled a novel mobile Trojan that employs an innovative communication technique. This method, known as protobuf data serialization, enhances its ability to pilfer sensitive data from compromised devices. Initially detected by…
Loan App Executive Asks BJP Legislator to Repay Loan That He Never Borrowed
Even prominent politicians fall prey to scammers in the world of cybercrime, which is a tremendous leveller. A person who is still unknown repeatedly called and texted the BJP legislator Ashish Shelar, requesting that he pay back a debt…
Threat of Fake Signal and Telegram Apps: Protecting Your Privacy and Security
In today’s digital age, the use of messaging apps has become an integral part of our daily lives. Apps like Signal and Telegram have gained immense popularity due to their focus on privacy and security. However, with the rise in…
3 Vital Cybersecurity Threats for Employees
Cybersecurity is no longer just the IT department’s job in today’s digitally connected society. Protecting confidential firm information is the responsibility of every employee, from the CEO to the newest intern. Cybercriminals are growing more skilled, and their methods are…
Chinese Chipmaker Accelerates Tool Replacement Amidst Sanctions
To counter U.S. sanctions that have slowed sales of semiconductors in China, a top executive at Huawei said Friday that the country’s semiconductor industry will be “reborn” following U.S. sanctions. In reaction to Washington’s tech export restrictions on China,…
VMConnect Supply Chain Attack Persists
During the initial weeks of August, the ReversingLabs research team uncovered a malicious supply chain operation, code-named “VMConnect.” This nefarious campaign involved the distribution of approximately twenty-four malevolent Python packages through the Python Package Index (PyPI), a widely used…
UN Reports: Hundreds of Thousands Coerced into Working in Online Scams
A latest UN investigation reports that hundreds of thousands of people have been trafficked to Southeast Asia to operate online scams. Apparently, at least 12,000 individuals from Myanmar and another 100,000 Cambodian nationals have been coerced into working on these…
Why Sharing Boarding Pass Pictures on Social Media Is a Privacy Risk, Warns Expert
Individuals flying for the first time are aware that an airline boarding pass includes certain details about a traveler, such as their name, flight number, and seat assignment. However, what might not be common knowledge is that these tickets,…
Why Next-Generation Firewalls are Essential for Modern Network Security
Firewalls have long been considered the first line of defense in network security. They monitor and control incoming and outgoing network traffic based on predetermined security rules. However, as technology evolves and cyber threats become more sophisticated, traditional firewalls are…
Meta Publishes FACET Dataset to Assess AI Fairness
FACET, a benchmark dataset designed to aid researchers in testing computer vision models for bias, was released by Meta Platforms Inc. earlier this week. FACET is being launched alongside an update to the open-source DINOv2 toolbox. DINOv2, which was…
Generative AI: A Catalyst for Enterprise IT & Security Challenges
Every day, new applications of artificial intelligence and machine learning are being explored and there is much to learn from them. Information and opinions are pouring out like a firehose, which is both inspiring and terrifying at the same…
When Will Robots Take Over Your Household Chores?
Researchers at MIT’s Computer Science and Artificial Intelligence Laboratory are striving to create a future where robots take on tasks like brewing coffee and arranging dining tables. The scientists at MIT are using simulations to teach robots how to handle…
OpenAI’s ChatGPT accused of GDPR breaches
OpenAI, the maker of ChatGPT, has been accused of a series of data protection breaches in a GDPR complaint filed by a privacy researcher. The complaint argues that OpenAI infringes EU privacy rules in areas such as lawful basis, transparency,…
OpenAI’s GPTBot Faces Media Backlash in France Over Data Collection Fears
A new level of tension has been created between the press and giants within the artificial intelligence industry. The OpenAI robot that runs on websites to suck up content and train its AI models, including the famous ChatGPT conversational…
GhostSec: Hacktivist Breach Iranian Surveillance Software
Hacking group GhostSec confirmed that they have taken down Fanap Behnama – Iran’s privacy-invading software – and also mentioned details of its surveillance capabilities. Apparently, GhostSec exposed 20GB of data that involved source code relating to face recognition and motion…
Flight Data Issues Trigger UK Air Traffic Control Failure
A significant air traffic control malfunction resulted in extensive flight disruptions, leaving numerous passengers stranded both domestically and internationally. The root cause of this disruption was attributed to issues with the reception of flight data. Martin Rolfe, the CEO…
New Study Reveals Airbnb as a Haven for Cybercrime
Cybercriminals have been increasingly using the Airbnb network for illicit activities. A new research by cybersecurity experts at SlashNext uncovered the methods employed by these malicious actors to hack user accounts and benefit from stolen data. Due to its…
Firefox Browser Enhances Email Security with New Built-in Tools
Mozilla Firefox, a well-known web browser, has significantly improved the protection of users’ email addresses in an age where internet privacy and security have elevated worries. The addition of additional built-in technologies has made Firefox even more capable of protecting…
Ransomware Gangs are Evolving: Cryptocurrency Flaws Could be Their Next Target
Dallas City Government, in May 2023, faced a ransomware attack which resulted in the temporary halt in their operations which included hearings, trial and jury duty and the closure of the Dallas Municipal Court Building. The attack further impacted police…
Rackspace has Spent $11 Million on Ransomware Cleanup So Far
Cloud computing behemoth Rackspace reported in an earnings presentation issued earlier this month that it has already spent $10.8 million responding to a Play ransomware group attack that started late last November against its hosted Exchange environment. 30,000 Rackspace…
Emerging Phishing Campaigns Aim FTX Users After Kroll Data Breach
In a recent turn of events that has reverberated across the cryptocurrency community, Changpeng ‘CZ’ Zhao, the Chief Executive Officer of Binance, a globally renowned cryptocurrency exchange, has issued a stern caution to users who were formerly associated with…
Boosting Business Efficiency: OpenAI Launches ChatGPT for Enterprises
Known for its ChatGPT chatbot, OpenAI has announced the launch of ChatGPT Enterprise, the chatbot product that is the most powerful one available for businesses. Earlier this week, OpenAI introduced ChatGPT Enterprise, an AI assistant that provides unlimited access…
Beware: Government’s Alert on Smishing Scam Threat
The Indian government has now urgently warned its citizens about the threat posed by smishing scams. Smishing, a combination of the words ‘SMS’ and ‘phishing,’ is the practice of hackers sending false text messages to people in an effort to…
Why Web3 Penetration Testing is Vital for Protecting Decentralized Systems
Web3, the transformative evolution of the internet, has introduced a new era of decentralization, opening up exciting opportunities for applications, transactions, and interactions. With a strong focus on user control, data integrity, and transparency, Web3 technologies are reshaping the…
Ransomware Vendetta: Rhysida Group Strikes Prospect Medical, Warns of Auctioning Stolen Data
It has been claimed that Rhysida, an ever-evolving ransomware group, is responsible for the recent cyberattack on Prospect Medical Holdings during which hospitals and medical facilities in four states have been attacked. As a result, Prospect Medical Holdings was…
Duolingo Data Breach: Hackers Posts Scrapped Data on Hacking Forum
After Discord’s data breach that resulted in its temporary halt in operations, the popular language learning app – Duolingo is facing a data breach. An X post (previously tweeted) by user @vx-underground stated that a threat actor scraped data of…
Ransomware Actor Linked to Attacks Against Citrix NetScaler System
Unpatched Citrix NetScaler systems are compromised in domain-wide attacks by a threat actor believed to be linked with the FIN8 hacker organisation exploiting the CVE-2023-3519 remote code execution vulnerability. Sophos has been keeping an eye on this campaign since…
Google Urges Gmail Users Set Up 2FA for Enhanced Security
Google recently issued a stern recommendation to its Gmail users asking them to use Two-Factor Authentication (2FA) as a crucial step to safeguard their accounts in an effort to strengthen user security. The new security alert system from the IT…
In an Attack on WebDetective’s Servers, Hackers Deleted Victim Data
There has been an attack on the makers of a tool that is widely used to track mobile devices, which destroyed all the data that was gathered on the victims and exposed those who were paying for the spyware…
Worldcoin: Ldcoin’s Token Value Falls by More Than 50% as Privacy Concerns Grow
Several regularity concerns have been raised since the launch of Worldcoin’s (WLD) mainnet, resulting in a decline of more than 50% in the value of its token. Trading at $1.27 at press time, the price per WLD token has dropped…
Police Federation: Metropolitan IT System Breach Could Have Serious Consequences
The Metropolitan Police has been made aware of unauthorized access to the IT system of one of its suppliers. The police is working with the company to determine if any Metropolitan Police data has been compromised. A spokesperson for…
Quid Pro Quo Attacks: Cyber Threat to Watch Out For
A threatening message appears out of nowhere. You owe money, or a loved one is in jeopardy, according to the sender’s unknown claims. They threaten consequences unless you cough up the cash or disclose personal information. To say the…
Met Police Investigates Alleged Data Breach of Officer Information
The Metropolitan Police in London has launched an investigation into a suspected data breach that reportedly involves the leakage of sensitive information related to officers. The breach has raised concerns over the security of law enforcement personnel’s data and the…
How can Small Businesses Protect Themselves From Cyber Threats?
In today’s world where businesses of kinds and shapes are developing into a digitalized body, it has also increased chances of cybercrime in their cyber spaces significantly. Newbie business personnel who are looking forward to set a business in bakeries,…
NightOwl App is Targeting Older Macs to Siphon User Data
The NightOwl app, which was once a popular option for automatically transitioning between dark and light modes on macOS Mojave, has been identified to secretly store user data. NightOwl was initially introduced in 2018 as a third-party software to…
Scarab Ransomware Toolkit: Unveiling the Ingenious Weaponry
In a recent report, cybersecurity researchers from the ESET cybersecurity company highlighted that malware of the Scarab ransomware family has been deployed to spread its variants across global victim organizations using a malicious toolset named Spacecolon. ESET has issued…
Cryptocurrency Giants FTX, BlockFi, and Genesis Hit by Kroll Hack
Customers of prominent cryptocurrency companies FTX, BlockFi, and Genesis had their financial and personal information exposed in a recent cybersecurity breach. Concerns have been expressed about the security of private information in the cryptocurrency sector as a result of the…
Rhysida Ransomware Group: Social Security Numbers, Passport Data Compromised in Recent Hospital Attack
On Thursday, the Rhysida ransomware gang confirmed to have been behind the recent cyberattack on Prospect Medical Holdings, as reported by a dark web listing reviewed by Axios. Apparently, the ransomware gang stole more than 500,000 Social Security numbers and…
Introducing China’s First Blockchain-Based Data Exchange, Revolutionizing Web3 Data Trading
On August 23, 2023, in Hangzhou, China unveiled the first-ever blockchain-powered data exchange that brings the country’s innovative prowess to the fore at the world’s largest gathering of global leaders. With the inception of this technological wonder, data trading…
Here’s How AI Can Revolutionize the Law Practice
Artificial intelligence (AI) has gained enormous pace in the legal profession in recent years, as law firms throughout the world have recognised the potential value that AI can bring to their practises. Law companies realise significant efficiencies that increase…
Rapid Ransomware Dwell Time and Persistent RDP Vulnerabilities
The dwell period of ransomware hackers has decreased to just 5 days, a noteworthy trend in the constantly changing world of cyber dangers that demands prompt response. The urgent necessity for stronger cybersecurity measures is highlighted by the quick infiltration…
Recovered Stolen Mercedes Offers Glimpse into Hijackers’ Tactics
A recently recovered Mercedes-Benz, which had been stolen and then found equipped with counterfeit license plates and a forged license disc, has shed light on the operational tactics of hijacking syndicates and their ability to exploit technological advancements to…
Agriculture Industry Should be Prepared: Cyberattacks May Put Food Supply Chain at Risk
Technological advancement in the agriculture sector has really improved the lives of farmers in recent years. Along with improved crop yields and cutting input costs, farmers can keep an eye on their crops from anywhere in the world. Now, farmers…
Surge in Ransomware Attacks: Hackers Set Sights on Schools
With the growing dependence of educational districts on technology for their operations, the occurrence of cyberattacks on K-12 schools is on the rise. In the year 2023, there have been ransomware attacks on at least 48 districts, surpassing the…
Ransomware’s Alarming Surge and Active Adversaries
Ransomware attacks have increased dramatically recently, worrying the cybersecurity community and heralding a new era of cyber threats. The convergence of sophisticated tactics used by hostile actors, as described in numerous reports, highlights the necessity of increased attention and proactive…
North Korean Hacker Linked to Tornado Cash Laundering
After authorities banned the Russian-founded cryptocurrency platform Tornado Cash over its alleged support for North Korean hackers a year ago, it has been announced that two co-founders of the cryptocurrency mixer have been charged with money laundering and other…
Lazarus Employs Public ManageEngine Exploit to Breach Internet Firms
The North Korean state-backed hacking group Lazarus has been compromising an internet backbone infrastructure provider and healthcare organisations by exploiting a major flaw (CVE-2022-47966) in Zoho’s ManageEngine ServiceDesk. The attacks kicked off earlier this year with the goal of…
Call of Duty Bid: Microsoft Makes New Bid to Acquire Call of Duty Giant
In the newest turn of events, Microsoft has made an offer to acquire Activision Blizzard, the company behind the Call of Duty video game. Its original bid of $69bn is however blocked by UK regulators. According to Brad Smith, Microsoft’s…
Akira Ransomware Unleashes a New Wave of Attacks via Compromised Cisco VPNs
The Cisco Network Security Division is aware of reports suggesting that malicious individuals are infiltrating organizations through Cisco VPNs that are not configured for multi-factor authentication with the Akira ransomware threat. In some instances, threat actors are targeting organizations…
Google Workspace Unveils AI-Powered Security
Google LLC announced today a set of new artificial intelligence-powered cyber defence controls, the majority of which will be deployed to its Workspace cloud platform later this year. Data loss prevention, often known as DLP, and data privacy controls…
Decentralized Network Friend.tech Faces Controversy After Data Breach
In the dynamic landscape of cryptocurrency and decentralized networks, Friend.tech emerged as a promising contender; however, it has faced significant backlash following a recent data breach. This event has sparked concerns regarding the platform’s security protocols and the broader…
Friend.Tech Hit by Cyber Attack
Protecting sensitive information is now a top priority for both individuals and businesses in the digital age when data is king. The recent data breach at Friend.tech, regrettably, has once more highlighted how vulnerable our globally networked world is.…
Recent Vulnerability Puts 3,000 Openfire Servers at Risk of Attack
More than 3,000 instances of Openfire servers have not undergone patching to address a recent vulnerability, leaving them susceptible to potential attacks exploiting a newly discovered exploit, according to a report by VulnCheck, a firm specializing in vulnerability intelligence. Openfire,…
MOVEit Attacks Makes Clop the Most-active Ransomware Threat Actor This Summer
According to numerous threat intelligence reports, this July, Clop had been the reason for about one-third, executing financially-motivated, placing the financially driven threat actor to emerge as the most active ransomware threat actor this summer. The ransomware gang’s mass exploit…
Location Leak: Christie’s Mistakenly Exposes Whereabouts of Consigned Artworks
A university professor living in a large town in western Germany was busy on a recent Wednesday evening preparing several paintings for sale through the British auction house Christie’s, an auction house that conducts auctions around the world. By…