Tag: CySecurity News – Latest Information Security and Hacking Incidents

Qbot: The Ever Expanding Malware Family

  Given how widespread malware has become, new “families” of each type are being developed. Qbot, a family of malware that is used to steal data, falls under this category.  Qbot’s history  As is sometimes the case with malware, Qbot…

Tasmanian Hit by Big Data Breach Confirmed by Minister

  The Tasmanian Department of Education, Children, and Young People experienced a cyber attack where hackers targeted and breached the third-party file transfer service GoAnywhere MFT. The breach took place last month and the state government confirmed on March 31…

eFile.com Hosted Malware on its Website

  Malicious code was injected into eFile.com’s server, an online service that assists people with filing tax returns. This resulted in malware being delivered to users’ computers.  It was discovered that the software service, which is authorized by the Internal…

APT43: Cyberespionage Group Targets Strategic Intelligence

APT43, also known as Kimsuky or Thallium, recently exposed by the Mandiant researchers, is a cyberespionage threat group supporting the objectives of the North Korean regime. By conducting credential harvesting attacks and successfully compromising its targets using social engineering, ATP43…

Organizations Struggle with Data Breach Disclosure

A recent survey conducted by cybersecurity firm Bitdefender highlights the ongoing struggle of organizations to handle data breaches and cybersecurity challenges. The survey revealed that a third of organizations have admitted to covering up data breaches, while 42% of IT…

Genesis Market: The Fall of a Cybercrime Website

Law enforcement agencies worldwide have dealt a blow to the criminal underworld with the takedown of Genesis Market, a notorious website used to buy and sell stolen data, hacking tools, and other illicit goods and services. The investigation involved coordinated…

Sophos Says Nearly Every Company Was Attacked Last Year

  Organizations are constantly bombarded with malicious activity, suffering negative impacts. In the State of Ransomware 2022 report, published by Sophos, a global leader in next-generation cybersecurity, a comprehensive overview of the real-world ransomware experiences of consumers has been provided…

Malicious Attacks Use Log4j Bugs

  An increasingly popular form of fraud that utilizes legitimate proxyware services to hijack legitimate ones has been identified by threat actors. Some services allow people to sell Internet bandwidth to third parties to make extra money. According to researchers from…

Google Mandates Easy Account Deletion for Android Apps

Google is implementing a new data policy for Android apps that also includes a setting for account deletion to provide customers with more transparency and control over the data.  The measure would compel app developers to provide users with in-app…

3CX Cyberattack: Cryptocurrency Firms at Risk

Cryptocurrency companies were among the targets of the recent 3CX supply chain attack, according to security researchers. The attack began with the compromise of 3CX, a VoIP provider used by businesses for communication services. Cyber attackers then installed a backdoor…

Data of 3700 Customers Exposed by the Service NSW Bug

  It has been confirmed that Greg Wells, Service NSW’s chief executive, said that the personal information of 3,700 customers was left exposed. This incident occurred on March 20 between 1:20 pm and 2:54 pm.  Earlier this week, 3700 affected…

Controversial Cybersecurity Practices of ICE

US Immigration and Customs Enforcement (ICE) have come under scrutiny for its questionable tactics in data collection that may have violated the privacy of individuals and organizations. Recently, ICE’s use of custom summons to gather data from schools, clinics, and…

Million-Dollar Ransom Demanded by Ransomware Gang

  On the threat landscape in recent years, alarming numbers of ransomware groups sprung up. This is just as mushrooms grow from the ground after a shower.  In recent months, an emerging ransomware group called ‘Money Message’ has appeared. This…

Pinduoduo App Malware: A Security Warning

Pinduoduo, a popular Chinese e-commerce app, has come under scrutiny from cybersecurity experts after multiple reports of malware surfaced. According to CNN, a recent analysis found that the app contained a ‘sophisticated and complex’ malware strain that allowed attackers to…

3CX Supply Chain Attack Compromised Cryptocurrency Companies

  Some of the victims of the 3CX supply chain attack had their systems backdoored with Gopuram malware, with threat actors targeting cryptocurrency companies, particularly with this additional malicious payload.  In a large-scale supply chain attack, North Korean threat actors…

Role of AI in Revolutionizing Penetration Testing

Penetration testing is a critical component of any cybersecurity program. It involves simulating a real-world attack on an organization’s systems and infrastructure to identify vulnerabilities that can be exploited by hackers. However, traditional penetration testing methods can be time-consuming, labor-intensive,…

How Blockchain Technology Will Impact These Top 5 Industries

Blockchain technology is a digital ledger that is revolutionizing the way we conduct transactions, store data, and manage digital assets. It is a distributed, decentralized system that provides transparency, security, and immutability, making it a perfect fit for various industries. …

Why Endpoint Resilience Is Important

  LastPass, a password management company, made headlines last month when it revealed that one of their DevOps engineers had his personal home computer hacked and infected with keylogging malware, resulting in the exfiltration of corporate data from the vendor’s…

A Microsoft Azure Flaw Could Compromise Bing and Office 365

  Microsoft Azure Active Directory (Azure AD) appears vulnerable to a new vulnerability discovered by security researchers. It was discovered that a vulnerability in Bing search results allowed users to alter the results and view users’ private information. This included…

Ransomware Threats in 2023: Increasing and Evolving

Cybersecurity threats are increasing every year, and 2023 is no exception. In February 2023, there was a surge in ransomware attacks, with NCC Group reporting a 67% increase in such attacks compared to January. The attacks targeted businesses of all…

Protect Yourself from Healthcare Cyber Risks

  It has become increasingly apparent in the past few years that technology has played a significant role to assist hospitals and patients in managing their interactions. This is at a time when healthcare systems are stretched to their limits.…

IcedID: A New Era with ‘Lite and Fork’ Malware

  Proofpoint, a cybersecurity research firm, recently discovered two new variants of the IcedID malware namely “Lite” and “Forked.” The original IcedID malware has been around since 2017 and is commonly used by cybercriminals, but these new versions were only…

Online Privacy is a Myth; Here’s Why

Although it seems simple in theory, the reality is more nuanced when it comes to privacy. Our experience online has been significantly changed by ongoing technological advancements. Today, we use the internet for more than simply work and study; we…

Fraudsters Are Difficult to Spot, Thanks to AI Chatbots

  Researchers at the University of Rochester examined what ChatGPT would write after being asked questions sprinkled with conspiracy theories to determine how the artificial intelligence chatbot would respond.  In recent years, researchers have advised companies to avoid chatbots not…

Are Chatbots Making it Difficult to Trace Phishing Emails?

Chatbots are curbing a crucial line of defense against bogus phishing emails by rectifying grammatical and spelling errors, a key attribute to trace fraudulent mails, according to experts.  The warning comes as international advisory published from the law enforcement agency…

Trojanized Tor Browser Bundle Drops Malware

  Cybersecurity experts are warning about a new threat in the form of trojanized Tor browser installers. The Tor browser is a popular tool used by individuals to browse the internet anonymously. However, cybercriminals have been able to create fake…

Lemon8 Enters US Top Charts With TikTok Parent

  The company ByteDance, which owns TikTok’s parent company ByteDance, released Lemon8, a social network app. Lemon8 boasts being one of this week’s top 10 most downloaded apps on the US App Store.  Lemon8 was released in Japan in 2020,…

NullMixer Campaign: A Threat to Cybersecurity

A new cybersecurity threat has recently emerged in the form of the NullMixer campaign, which is causing concern among experts. The campaign has been found to distribute new polymorphic loaders, a type of malware that poses a significant threat to…

How to Keep Up With a Shifting Threat Landscape

  Cybercrime is a problem that is only escalating and is bad for business, as one might anticipate. Regardless of how you feel about it, it forces your business to take action in order to secure its infrastructure. Current threat…

How Threat Actors are Using IPFS for Email Phishing

InterPlanetary File System (IPFS) is a peer-to-peer distributed file system, that allows users around the world to exchange files. Instead of using file paths for addressing like centralized systems do, IPFS uses unique content identifiers (CID). The file itself stays…

Viral KYC Scam in Mumbai Steals Rs 1 Crore from 81 Users

  The UPI (Unified Payment Interface) payment system has significantly changed how online payments are made in India. The UPI system allows banking customers to transfer money instantly across bank accounts for all kinds of transactions, including online shopping and…

CLOPS Claim to Have Hacked 130 Organizations

  It is now reported that the Clop ransomware group – known for its Linux variant recently – has used the zero-day vulnerability of the GoAnywhere MFT file transfer tool that they claim to have hacked into hundreds of organizations…

Upgrading Online Security with Password Managers

Online security has become a major concern for individuals and businesses alike, as cyber-attacks become more sophisticated and prevalent. Passwords play a critical role in protecting online security, but the traditional method of using passwords has become inadequate due to…

GoAnywhere Hack Targets UK Pension Protection Fund

  Among the largest asset managers in the United Kingdom, the U.K. Pension Protection Fund, which manages £39 billion in assets, confirmed that the hack against GoAnywhere, the popular file-transferring service, had impacted it.  There have been many reports in…

NCA Infiltrates Cybercrime Market With Fake DDoS Sites

UK’s National Crime Agency (NCA) has recently conducted a sting operation as a part of Operation Power Off, a collaboration of international law enforcement agencies to shut down DDoS (distributed denial of service) infrastructure.  In order to sabotage the online…

Users’ Private Info Accidentally Made Public by ChatGPT Bug

  After taking ChatGPT offline on Monday, OpenAI has revealed additional information, including the possibility that some users’ financial information may have been compromised.  A redis-py bug, which led to a caching problem, caused certain active users to potentially see…

A ChatGPT Bug Exposes Sensitive User Data

OpenAI’s ChatGPT, an artificial intelligence (AI) language model that can produce text that resembles human speech, has a security flaw. The flaw enabled the model to unintentionally expose private user information, endangering the privacy of several users. This event serves…