Tag: CySecurity News – Latest Information Security and Hacking Incidents

Ransomware Clop and LockBit Attacked PaperCut Servers

  A Microsoft spokesperson stated in a statement that recent attacks that exploited two vulnerabilities in the PaperCut print management software are likely associated with an affiliate program for the Clop ransomware.  PaperCut Application Server was updated last month with…

Chinese APT Group Hijacks Software Updates for Malware Delivery

An advanced persistent threat (APT) group from China, known as Evasive Panda, has been discovered to be hijacking legitimate software update channels of Chinese-developed applications to deliver custom malware to individuals in China and Nigeria for cyber-espionage purposes. Researchers from…

Google Takes Down Cryptbot Malware Infrastructure

Google has taken down the infrastructure and distribution network linked to the Cryptbot info stealer, a malware that was being used to infect Google Chrome users and steal their data. The move comes after the tech giant filed a lawsuit…

Your Details are Hidden on this Secret ID on Your Phone

  The amount of people who want to exploit your private information is staggering, from social media platforms to email providers. It is imperative to remember not only online stores but personal services as well.  Many online businesses rely heavily…

Attackers Can Hide Malicious Apps Using the Ghost Token Flaw

  The Google Cloud Platform (GCP) has recently been patched against a zero-day vulnerability called GhostToken, which allowed attackers to infect the platform to create an invisible and irrecoverable backdoor. A malicious attacker could exploit this flaw and gain access…

Automated Bots Pose Growing Threat To Businesses

The capability to detect, manage, and mitigate bot-based requests has become of utmost importance as cyber attackers become more automated. Edgio, a company created by the merging of Limelight Networks, Yahoo Edgecast, and Layer0, has unveiled its own bot management…

Industrial Espionage: Here’s All You Need to Know

  Cyberattacks are actively guarded against by all responsible firms. However, one security concern that many firms ignore is industrial espionage. Industrial espionage and cyberattacks are frequently carried out for the same reason: to steal confidential information.  Industrial espionage, on…

APT Groups Tomiris and Turla Target Governments

  As a result of an investigation under the Advanced Persistence Threat (APT) name Tomiris, the group has been discovered using tools such as KopiLuwak and TunnusSched that were previously linked to another APT group known as Turla.  Positive results…

Cloud Storage: Is Stored Data Secure ?

  The popularity of cloud storage is on the rise, both for personal and professional use. However, many people are concerned about the security of their data in the cloud. While some worry about the future-proofing of their cloud storage,…

Decoy Dog Malware Toolkit: A New Cybersecurity Threat

  A new cybersecurity threat has been discovered that could potentially put millions of people at risk. According to a report from Bleeping Computer, researchers have found a new malware toolkit called ‘Decoy Dog’ after analyzing 70 billion DNS queries.…

Be Wary Because Cybercriminals Are Getting More Ingenious

  In the media, misinformation is regularly discussed, primarily in relation to politics and is often used interchangeably with fake news. Even though these are major problems, a greater and more direct threat is frequently disregarded: how cybercriminals utilise false…

Google Delivers Bumblebee Malware

  A malware campaign has recently been detected that uses Google ads and SEO poisoning to spread malware. The malware that attacks corporate users is dubbed Bumblebee. It was discovered that Bumblebee, a malware targeted at enterprise users, is distributed…

Vehicles Stolen Using High-Tech Methods by Criminals

  Over the past 20 years, the number of cars stolen in the United States has been reduced by half. However, authorities are now seeing an increasing number of break-ins associated with high-tech techniques being used in these break-ins.  There…

This Evil Extractor Malware Steals Data from Windows Devices

  Experts have discovered a hazardous new malware strain that is circulating the internet, stealing sensitive data from victims and, in some cases, installing ransomware as well. The malware, dubbed Evil Extractor, was found by Fortinet cybersecurity experts, who published…

ChatGPT: A Game-Changer or a Cybersecurity Threat

The rise of artificial intelligence and machine learning technologies has brought significant advancements in various fields. One such development is the creation of conversational AI systems like ChatGPT, which has the potential to revolutionize the way people communicate with computers.…

Deepfake Apps Remain Popular in China Despite Crackdown

The Chinese government has recently launched a crackdown on deepfakes, a type of synthetic media that involves manipulating images, videos, or audio to make them appear to be real. Despite these efforts, however, several Chinese apps that utilize deepfakes are…

Shadow IT, SaaS Pose a High Security Threat for Businesses

  Software as a service (SaaS) has undeniably reached the height of its popularity. Modern corporate operations and continuity depend today more than ever on software technologies. The right procurement procedures haven’t yet been adopted by enough businesses, despite this,…

Ransomware Attacks Surge in March 2023

According to recent reports, March 2023 saw a record-breaking number of ransomware attacks globally, with a staggering 459 incidents reported. This highlights the increasing prevalence and sophistication of cyber-attacks and the need for robust cybersecurity measures. Ransomware attacks involve hackers…

ChatGPT: A Threat to Privacy?

  Despite being a powerful and innovative AI chatbot that has quickly drawn several people’s attention, ChatGPT has some serious pitfalls that seem to be hidden behind its impressive features.  For any question you ask it, it will be able…

LockBit Operators Target Apple MacOS Devices

  In order to encrypt files on devices running Apple’s macOS operating system, the actors behind the LockBit ransomware campaign have created new artifacts.  It appears that the development marks the first time a large-scale ransomware group has produced a…

Domino Backdoor Malware Created by FIN7 and Ex-Conti

  Members of the now-defunct Conti ransomware gang have been using a new strain of malware developed by threat actors likely affiliated with the FIN7 hacking group. This suggests that the two teams collaborated in the malware development, indicating a…

Commscope Ransomware Attack Exposes Sensitive Employee Data

Hackers have once again targeted a company, this time Commscope, and stolen sensitive employee data during a ransomware attack. According to reports, the hackers have published the stolen data online, including personal information, job titles, and email addresses of Commscope…

Auditing Algorithms for Responsible AI

  As artificial intelligence (AI) systems continue to advance, the need for responsible AI has become increasingly important. The latest iteration of the GPT series, GPT-4, is expected to be even more powerful than its predecessor, GPT-3, and this has…

Kidnapping Scam Implicates AI Cloning

  With ChatGPT and other businesses developing artificial intelligence (AI) technology for their customers, artificial intelligence (AI) has gained traction. The three major technology companies, Google, Microsoft, and Meta appear to be investing heavily and concentrating their efforts on artificial…

ChatGPT’s Cybersecurity Threats and How to Mitigate Them

  The development of ChatGPT (Generative Pre-trained Transformer) technology marks the beginning of a new age in communication. This ground-breaking technology provides incredibly personalised interactions that can produce responses in natural language that are adapted to the user’s particular context…

Hackers Exploit Action1 RMM in Ransomware Attacks

  Remote Monitoring and Management (RMM) tools are an essential part of IT management, allowing businesses to remotely monitor and manage their IT systems. However, recent reports indicate that hackers increasingly target RMM tools to launch ransomware attacks against businesses.…

This New Cybercrime Group Uses Ransomware to Target Businesses

  Researchers in cybersecurity have detailed the techniques of a “rising” cybercriminal group known as “Read The Manual” (RTM) Locker, which operates as a private ransomware-as-a-service (RaaS) provider and conducts opportunistic attacks to make illegal profit. “The ‘Read The Manual’…

The Montana Legislature Banned TikTok

  A bill introduced in Montana would prevent apps like TikTok from being listed for download on app stores such as Google Play and Apple’s App Store. The bill is forwarded to Republican Governor Gianforte for signature.  TikTok, owned by…

Mass Layoffs and Corporate Security Risks

  Mass layoffs have become increasingly common in recent years as companies look to cut costs and remain competitive. While these layoffs can provide short-term financial benefits, they can also create new risks for corporate security. One of the key…

Cryptocurrency Scams: How to Detect and Avoid Them

  Due to the prevalence of fraudulent activity since its inception, the bitcoin market has become well-known. Scammers employ a number of techniques to trick bitcoin consumers and take their hard-earned money.  How do crypto phishing scams work? The well-known…

Russian APT Hackers Increasingly Attacking NATO Allies in Europe

  In accordance with the Polish CERT and Military Counterintelligence Service, an ongoing cyberespionage effort linked to a Russian nation-state entity is targeting European government agencies and diplomats in order to collect Western government intelligence on the Ukraine war. According…

EU Privacy Watchdog Forms ChatGPT Task Force

The European Union’s privacy watchdog, known as the European Data Protection Supervisor (EDPS), has recently announced the formation of a task force to examine the potential privacy and data protection issues related to the ChatGPT language model. ChatGPT is a…

Data Breaches: What Do They Mean?

Data protection is a critical component of any business, whether it’s a bank, password manager, merchant, telecom provider, or another corporation. A top engineer’s personal computer has been compromised by hackers, the latest blow to LastPass, which recently fell, victim.…

Spyware Offered to Cyberattackers via PyPI Python Repository

  Researchers spotted malware peddlers openly selling an info-stealer on the Python Package Index (PyPI) — the official, public repository for the Python programming language — with only the thinnest concealment. The attackers, who Sonatype researchers linked to the SylexSquad…

Employing Zero Trust to Defend Against Backdoor Attacks

  Attackers are increasing the number of backdoor attacks they use to spread malware and ransomware, showing that organisations cannot put any trust in anyone to protect their endpoints and identities.  According to IBM’s Security X-force Threat Intelligence Index 2023,…

Firmware Caution Advises MSI Cyberattack

  Aside from gaming hardware manufacturers, modern corporations face constant attacks from malicious hackers and other digital no-goodniks. Corporations are not the only ones attacked by malicious hackers. MSI confirmed to its customers it had been attacked.  MSI has enumerated…

Cambodia Deports 19 Japanese Cybercrime Scam Suspects

Cambodia has deported 19 Japanese nationals for allegedly running online scams. According to reports, these individuals were involved in a cybercrime operation that used telephone calls to deceive people and steal their money. This incident highlights the need for improved…

Users of Android can Now Save Space by Auto Archiving

  In an announcement by Chang Liu and Lidia Gaymond, Google Play product managers announced that an upcoming auto-archive feature would be introduced later this month. This feature has been added to make device storage management easier for Android users.…

Tech Giant Alibaba to Launch ChatGPT Rival

  Alibaba, a global leader in technology, has revealed a new artificial intelligence product that will soon be incorporated into all of the company’s apps and is similar to ChatGPT.  Earlier this year, Alibaba revealed it was developing a ChatGPT…

Sushiswap Smart Contract Exploited in $3.3 Million Hack

Sushiswap, a popular decentralized cryptocurrency exchange, recently fell victim to a smart contract hack that resulted in a loss of $3.3 million. The hack highlights the need for stronger cybersecurity measures in the cryptocurrency industry and the importance of taking…

Upper Galilee Irrigation Systems Crippled by Cyberattack

  There have been reports of several water monitors malfunctioning on Sunday due to a cyberattack targeting monitoring systems that monitor irrigation systems and wastewater treatment systems.  It has been found that specific water controllers used to irrigate fields in…

What to Look For If Your Phone Is Hacked

  More frightening is having your phone hacked if you are connected to the internet, just like any other device. It is a well-known fact that smartphones are a particularly tempting target for hackers, as they are any device with…

Qbot: The Ever Expanding Malware Family

  Given how widespread malware has become, new “families” of each type are being developed. Qbot, a family of malware that is used to steal data, falls under this category.  Qbot’s history  As is sometimes the case with malware, Qbot…

Tasmanian Hit by Big Data Breach Confirmed by Minister

  The Tasmanian Department of Education, Children, and Young People experienced a cyber attack where hackers targeted and breached the third-party file transfer service GoAnywhere MFT. The breach took place last month and the state government confirmed on March 31…

eFile.com Hosted Malware on its Website

  Malicious code was injected into eFile.com’s server, an online service that assists people with filing tax returns. This resulted in malware being delivered to users’ computers.  It was discovered that the software service, which is authorized by the Internal…

APT43: Cyberespionage Group Targets Strategic Intelligence

APT43, also known as Kimsuky or Thallium, recently exposed by the Mandiant researchers, is a cyberespionage threat group supporting the objectives of the North Korean regime. By conducting credential harvesting attacks and successfully compromising its targets using social engineering, ATP43…

Organizations Struggle with Data Breach Disclosure

A recent survey conducted by cybersecurity firm Bitdefender highlights the ongoing struggle of organizations to handle data breaches and cybersecurity challenges. The survey revealed that a third of organizations have admitted to covering up data breaches, while 42% of IT…

Genesis Market: The Fall of a Cybercrime Website

Law enforcement agencies worldwide have dealt a blow to the criminal underworld with the takedown of Genesis Market, a notorious website used to buy and sell stolen data, hacking tools, and other illicit goods and services. The investigation involved coordinated…