Russian hacker Mikhail Matveev was indicted and sanctioned by the United States on Tuesday for allegedly leading the Babuk cybercrime group and serving as a “major actor in the Russian ransomware ecosystem.” Matveev was charged by federal prosecutors in New…
Tag: Information Security Buzz
Chinese Hackers Mustang Panda Attacks TP-Link Routers
The Chinese state-sponsored hacking outfit “Camaro Dragon” attacks household TP-Link routers with bespoke “Horse Shell” malware to attack European foreign affairs organizations. Hackers use backdoor virus in custom firmware for TP-Link routers to launch assaults from home networks. According to…
RA Group Hacks Businesses Using Stolen Babuk Source-Code
The ransomware attacks of the recently identified RA Group, the latest threat actor to use the stolen Babuk code, have increased in frequency and severity. Their specialized technique sets them apart from the rest of the Babuk tribe. This week,…
Damage Cyberattack Halts Publication At The Philadelphia Inquirer
Based on reports from The Philadelphia Inquirer, the paper’s operations were severely disrupted over the weekend due to a hack, making it impossible to print the paper’s Sunday issue. The attack was discovered on Saturday morning when staff noticed the…
Merdoor Backdoor Exploits Agencies By The Lancefly APT
South and Southeast Asian government, airline, and telecom institutions have been targeted by a new APT hacking outfit called Lancefly, which employs a variant of the ‘Merdoor’ backdoor malware. Symantec Threat Labs announced today that Lancefly has been using the…
5.8 Million People Affected by Data Breach at PharMerica
On April 8 that the Money Message ransomware organization attacked the national pharmacy network PharMerica and its parent company. The home and community healthcare business BrightSpring Health. Threat actors exposed evidence data, a statement was obtained from BrightSpring, and additional…
Toyota: Tragic Data Breach, 2 Million Vehicles Affected For Ten Years
Recently, Toyota admitted to having one of the worst data breaches in the automotive sector. Approximately 2 million automobiles sold in the business’s home market have had their information put at danger, the company said. Unlikely as it may sound,…
Review Of News and Events That Happened This Week
A rundown of the headlines of news and events from the past week pertaining to ransomware, data breaches, quick response security, and other related topics. Malware Attacks From SmokeLoader And RoarBAT, CERT-UA Warns CERT-UA has reported the spread of SmokeLoader…
How To Avoid Mother’s Day Scams By Protecting Your Purse And Heart
Mother’s Day is a special day celebrated across many countries, including the United States. To commemorate the love and contributions of mothers and mother figures to their families. It most times falls on the second Sunday in May and is…
9 Ransomware Forms Against VMware ESXi Built From Babuk Source Code
As many as nine distinct ransomware families that are able to target VMware ESXi systems have been developed thanks to the disclosure of Babuk (also Babak or Babyk) ransomware code in September 2021. Alex Delamotte, a security researcher at SentinelOne,…
Tech Provider ABB Struck By Black Basta Ransomware Attacks
The Black Basta ransomware assault apparently hampered business activities at the Swiss multinational corporation ABB, a renowned electrification and automation technology provider. ABB has its headquarters in Zurich, Switzerland, and in 2022 expects to bring in $29.4 billion in sales…
10 Web Development Skillset And Key Abilities You Can’t Ignore
Web development involves building and programming websites and apps. It’s different from web design, which focuses on how websites look. Web developers make sure websites work well and are easy to use. They write code using different programming languages depending…
Google Broadens Dark Web Monitoring To Track All Gmail Users
Gmail users now have access to Google’s free dark web monitoring service, which can detect if their email is being shared on hacking forums. Google One, the search giant’s paid subscription service in the United States, already has a dark…
North Korean Hackers Stole 830K Data From Seoul’s Top Hospital
The Seoul National University Hospital (SNUH) was hacked by North Koreans, according to the Korean National Police Agency (KNPA), who were after patients’ personal information and medical records. The crime occurred between May and June of 2021, and the police…
Hacker Pleads Guilty To Twitter’s 2020 Outage, Could Get 70 Years
A citizen of the United Kingdom has entered a guilty plea in connection with the July 2020 Twitter attack that compromised a large number of high-profile accounts and scammed other users. Joseph James O’Connor, whose online alias was PlugwalkJoe, was…
Phishing Ring Busted, Spanish Police Have Arrested 40 People
The National Police of Spain detained 25 persons in Madrid and Seville for alleged bank scams, including 2 hackers, 15 members of a criminal organization, and another 12 people involved in unlawful financial operations. Over 300,000 people may have been…
FBI Disables ‘Sophisticated’ Russian Snake Cyberspying Tool
U.S. officials announced on Tuesday that they had destroyed a worldwide network of compromised computers that Russian intelligence personnel had used to spy on the U.S. and its allies for over 20 years. It has been reported that a branch…
Phishing Ring Bust, Spanish Police Have Arrested 40 People
The National Police of Spain detained 25 persons in Madrid and Seville for alleged bank scams, including 2 hackers, 15 members of a criminal organization, and another 12 people involved in unlawful financial operations. Over 300,000 people may have been…
Severe Ruckus RCE Flaws Utilized By Fresh DDoS Botnet Malware
“AndoryuBot’ is a new malware botnet that infects unpatched Wi-Fi access points for DDoS assaults using a key Ruckus Wireless Admin panel weakness. CVE-2023-25717 allows remote attackers to execute code on susceptible Ruckus Wireless Admin panels version 10.4 and older…
Scanning Plans On Europe’s CSAM May Violate International Law
According to reports, legal experts for the EU have warned that plans to force tech companies to scan customers’ private chats for child abuse (CSEA) content are likely to be struck down by the courts. A contentious clause of the…
LinkedIn Displaces 716 Positions, Pulls Out Its China App
LinkedIn is eliminating 716 jobs and will begin winding down its local jobs app in China as part of the company’s restructuring. In a letter that was sent out today, LinkedIn CEO Ryan Roslanky explained the decision to discontinue the…
Intel BootGuard Secret Keys Compromised During An MSI Breach
Intel is looking into claims that private OEM BootGuard keys are out there after MSI reported a ransomware assault last month. Micro-Star International (MSI), a Taiwanese computer hardware manufacturer, said the previous month in a filing with the Taiwan Stock…
13 Additional Domains Linked To DDoS-for-hire Firms Seized By FBI
13 more domains connected to DDoS-for-hire platforms, sometimes referred to as “booter” or “stressor” services, have been seized, according to a recent announcement from the US Justice Department. The seizures this week are a part of Operation PowerOFF, an international…
NextGen Healthcare Hit By Data Breach, Over 1M+ Details Exposed
Hackers broke into the computers of NextGen Healthcare, an American provider of electronic health record software, and stole the personal information of over a million patients. NextGen Healthcare reported that hackers accessed the personal information of 1.05 million patients, including…
FinServ Ahead Of The Pack In API Transformation
The Financial Services industry (FinServ) has left its mark on the API landscape and continues to provide new reasons for innovation. From the first UK bank that pioneered Open Banking to the booming mobile payment industry, FinServ has prompted –…
Protecting DevOps Workflow From The Threat Of Malicious Packages
The compound word, DevOps, defines an extensive procedure and culture that comprises the process and technology of software planning/development (Dev) and IT operations (Ops). DevOps has helped shorten the time for organizational system development, improving the running of software while attaining…
Malware Attacks From SmokeLoader And RoarBAT, CERT-UA Warns
Based on the Computer Emergency Response Team of Ukraine (CERT-UA), the SmokeLoader malware is now being spread via a phishing campaign using lures centered around invoices. A ZIP folder containing a fake document and a JavaScript file is attached to…
Summary Of News and Events That Happened This week
A summary of news and events that happened this week with ransomware, data breaches, rapid response security, etc. Chatgpt Triumphantly Returns To Italy After …… Tech businesses and regulatory authorities must communicate and cooperate to resolve ChatGPT’s prohibition in Italy…
Constellation Struck By Ransomware Attack, ALPHV Lays Claim
On Thursday, Canadian software firm Constellation Software reported that threat actors had broken into some of its networks and stolen personal information and corporate data. A small number of systems used for internal financial reporting and related data storage by…
8 Top Authenticator App For iOS and Andriod In 2023
Recent data breaches have demonstrated that relying solely on passwords may be insufficient. Hence, the need for online security. A single password is frequently insufficient to protect sensitive data, such as what’s in your bank account or social media accounts. This…
Cisco Issues Urgent Security Warning For End-of-Life Phone Adapters
Cisco has warned that SPA112 2-Port Phone Adapters have a serious security flaw that could be used by a remote attacker to run any code on vulnerable devices. The problem, which is known as CVE-2023-20126, it also has a CVSS…
The Importance Of Endpoint Security When Implementing Zero Trust
Increasing numbers of organisations are moving to a Zero Trust security model. The growing frequency and sophistication of cyber threats is driving the popularity of this model which takes a robust ‘never trust, always verify’ approach to security. The National…
Google Implements Passkeys For Secured Sign-in To Google Accounts
Nearly five months after integrating passkey support into its Chrome browser, the tech giant has started implementing the password-free option for all Google Accounts across all platforms. This enables users to sign into their Google accounts without having to input…
Meta Unravels Social Media Cyber Espionage Operations In South Asia
Hundreds of well-developed fake profiles on Facebook and Instagram were used by three separate threat actors to launch separate assaults on users in Southern Asia. To spread their malware and steal sensitive information, each of these APTs leaned significantly on…
US Government Disengages Try2check Platform On The Dark Web
Denis Gennadievich Kulkov, a Russian national, was indicted by the U.S. government today on charges of running a stolen credit card checking business that made them gather in tens of millions of dollars. Kulkov allegedly made at least $18 million…
Dallas City Hit By Ransomware Assault Affects 2.6 Million People
Locking down some of its IT systems, the city of Dallas, Texas, was able to block the spread of the ransomware onslaught. Dallas City, Texas, is home to over 2.6 million people, which makes it the tenth most populous city…
Level Finance Crypto Exchange Hacked, After Two Security Audits
Over $1 million worth of digital assets were stolen from Level Finance, one of the leading cryptocurrency exchanges in the world. The incident happened on April 29, 2023, despite the exchange having gone through two security assessments and audits in…
FBI Uncovers 9 Crypto Exchanges In Ransomware Laundering
Nine cryptocurrency exchange websites that enabled money laundering for scammers and hackers, including ransomware operators, have been taken down by the FBI and Ukrainian police. According to a press release from the FBI, the ‘crypto exchanges’ operation was supported by…
PornHub Blocked In Utah State Due To SB287 Age Verification Law
In reaction to a new rule requiring websites to verify that a visitor from the state is 18 or older, adult film production company MindGeek has barred entrance to its websites platform in Utah (including PornHub, Brazzers, RedTube, YouPorn, and…
Hackers Take Advantage Of TBK DVR Camera System’s Severe Flaws
The alert notes that the fact that there are tens of thousands of TBK DVRs available under several brands, publicly accessible PoC code, and an easy-to-exploit make this issue an attractive target for attackers. The recent increase in IPS detections…
Optimising Cyber Security Costs In A Recession
Businesses today are facing two acute challenges – the economy and cybercrime. This is forcing CISOs to make some tough decisions about spending. The UK government’s Cyber Security Breaches Survey 2022 found that in the last 12 months, 39% of UK…
Apple Puts First Rapid Security Response Patch On iPhones
As of now, the release of Apple’s initial Rapid Security Response update to the public, which includes security fixes for iOS 16.4.1 and macOS 13.3.1, hasn’t been entirely smooth. According to a support document recently published by the company, RSR…
T-Mobile Data Breach, The Second Since The Year 2023
Although this breach only affected 1,000 customers as opposed to the 37 million affected by the previous one, T-Mobile US Inc. disclosed another data breach, its second disclosed breach in 2023. This is the eighth data breach since 2018. 836…
Ukrainian Government Targeted with Fake Windows Update
Various government entities in the nation have been the target of cyberattacks by Russian nation-state hackers, all based on the Computer Emergency Response Team of Ukraine (CERT-UA). APT28, also known as Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, Sednit, and…
Chatgpt Triumphantly Returns To Italy After Ban Is Lifted
In a surprising turn of events, the Italian government has now made a decision to lift the ban on OpenAI’s popular chatbot, ChatGPT, less than a month after its initial prohibition. The ban had been enacted over privacy concerns relating…
Weekly Summary Of News And Events This Week
A summary of news and events that happened this week with ransomware, data breaches, the banning of developers’ accounts, etc. Yellow Pages Canada Alerts of Cyberattack The Black Basta cyber attack on Yellow Pages Canada shows the continued threat of…
A Comprehensive Look At Email-Based Threats In 2023
It follows that vectors with greater internet exposure will also attract more attention from threat actors. Because of this, malicious actors frequently exploit public email servers, and a wide variety of cyber dangers can spread through them. We found some…
Severe Flaws In Illumina DNA Sequencing Technology, CISA Warns
The DNA sequencing machines used by genomics major Illumina have been found to include a critical software flaw that might be used by hackers to change or steal sensitive patient medical data. The U.S. Food and Drug Administration and cybersecurity…
50 Crypto Wallets Targeted by Atomic MacOS Malware
Security professionals have issued alerts regarding a new type of malware that targets MacOS devices in an effort to steal sensitive data, including credit card details, credit card expiration dates, and information from over 50 Bitcoin browser extensions. The threat,…
Google Bans And Deletes 173K Bad Developers Accounts In 2022
According to an update released yesterday, Google is making it more difficult for unscrupulous developers to publish their software on its Play Store while also deleting a significant number of bad accounts. The tech leader claimed that in 2022, it…
35M Downloads Of Android Minecraft Clones Spreads Adware
A group of 38 Minecraft-like games on Google Play attacked devices with the Android adware “HiddenAds,” which loaded ads in the background without the user’s knowledge. This made money for the games’ creators. Minecraft is a successful sandbox game with…
Good, Better And Best Security
What does a “good” cyber-security programme look like? How can we, in our role as Chief Information Security Officer (CISO), work to improve the effectiveness of the policies and practices implemented in our organisations? Measuring activity does not necessarily have…
CommScope Workers Left In The Dark After A Ransomware Attack
Employees at CommScope claim they haven’t heard from officials about the company’s response to a ransomware assault that allowed hackers to steal vast amounts of corporate and employee data from its networks in more than a week. The IT firm…
Microsoft Admits PaperCut Servers Used In LockBit and Cl0p Ransomware
Businesses and organizations of all kinds are increasingly concerned about ransomware attacks, and recent information from Microsoft reveals that even well-liked software applications can be exposed to attack. Microsoft recently acknowledged that the PaperCut servers were utilized to distribute the…
Google Goes After CryptBot Distributors Stealing Sensitive Data
Google has filed a lawsuit against individuals who use Cryptbot to infect Google Chrome users and steal their data. As part of its efforts to combat this malicious activity, Google is taking down the malware infrastructure associated with Cryptbot. In…
RCE Attacks Against Thousands Of Apache Superset Servers
At its default settings, Apache Superset is vulnerable to authentication bypass and remote code execution, allowing attackers to read and alter data, gather passwords, and issue commands. Apache Superset is a top-level project of the Apache Software Foundation since 2021.…
Saas Security: The Need For Continuous Sustenance
Data has emerged as a company’s most essential asset in the modern world. Every security team prioritizes protecting sensitive data, but changes to the perimeter have forced teams to adapt how they approach enterprise security. SaaS adoption has skyrocketed in…
VMware Resolves Crucial Pwn2Own Zero-Day Exploit Chain
To address zero-day vulnerabilities that might be used to achieve code execution on computers using unpatched versions of VMware’s Workstation and Fusion software hypervisors, the company has provided security upgrades. On the second day of the Pwn2Own Vancouver 2023 hacking…
Large 2,200x DDoS Amplification Assault Due To New SLP Flaw
Threat actors can conduct enormous denial-of-service attacks with 2,200X amplification thanks to a new reflected Denial-of-Service (DoS) increasing its vulnerability in the Service Location Protocol (SLP). Researchers at BitSight and Curesec identified this weakness as CVE-2023-29552. They claim that around…
Exposed Artifacts Seen In Misconfigured Cloud Software Registries
Thousands of exposed artifacts in cloud software repositories and registries with more than 250 million artifacts and over 65,000 container images have been found by cloud security company Aqua Security. Aqua found that even huge firms unintentionally exposed secrets, used…
OTP Codes Synchronized Across Devices With Google Authenticator
The upgrade matches a feature that rival authenticator apps and password-manager services have long provided. Thanks to Google’s Authenticator app, you no longer need to keep your one-time codes in a single location to secure your accounts. They can instead…
KuCoin Twitter Account Hacked, Losses $22.6K In Crypto Scam
A fake giveaway fraud that resulted in the theft of more than $22.6K in cryptocurrency was promoted by attackers after their access to KuCoin’s Twitter account was compromised. The bitcoin trading and exchange platform has pledged to fully compensate victims…
Yellow Pages Canada Alerts of Cyberattack As Black Basta Leaks Data
Yellow Pages Canada, an online and print directory service provider, has stated that it was the victim of a cyber attack that resulted in losing its customers’ data. The hacking organization Black Basta claimed to have collected personal information from approximately…
Tails Operating System: The Means To Privacy and Security On Internet
When it comes to cybersecurity and privacy, people are always on the lookout for solutions that will ensure their safety online. This solution that has been gaining popularity in recent times is the Tails operating system. Tails is a Linux-based…
Summary Of News And Events That Happened This Week
Here is a rundown of news and events that happened over the week. Chinese App Uses Android Flaw To Spy On Users, CISA Warns A top US security firm has given the government until May 4 to patch a zero-day…
GhostToken GCP Bug Gives Entry To Attackers Into Google Accounts
Security experts have revealed information about a Google Cloud Platform (GCP) zero-day vulnerability that has since been patched that may have allowed threat actors to hide an irremovable, malicious application inside a victim’s Google account. The flaw, dubbed GhostToken by…
Cisco and VMware Issues Security Updates For Critical Flaws
Cisco Systems has taken steps to enhance the security of its products by releasing a series of updates that fix critical vulnerabilities in its system. These vulnerabilities were identified as being capable of being exploited by attackers, who could then…
New Ransomware Attack Hits Health Insurer Point32Health
A ransomware attack affecting several of its systems is being dealt with this week by a New England health insurance company that provides services to over two million people. According to Point32Health, created through the merger of Harvard Pilgrim Health…
Daggerfly Cyberattack Campaign Strikes African Telecom Providers
African Telecom Service Providers Targeted by Daggerfly Cyberattack Campaign. Recently, the Daggerfly cyberattack campaign, aimed at numerous institutions worldwide, shocked the cybersecurity community. Experts describe this sophisticated attack effort as one of the most sophisticated and hazardous cyberattacks since it has caused…
Raspberry Robin Adopts Initiates Evasion Techniques
Security researchers at Check Point Research (CPR) have released an advisory that details the unique evasion techniques employed by threat actors who rely on the Raspberry Robin malware to avoid detection. In the advisory published on Tuesday, CPR experts explain the novel malware…
Warning From UK Cyber Agency For A New ‘Class’ Of Russian Hackers
There is a new “class” of Russian hackers, the UK cyber-agency warns. Due to an increased danger of attacks by state-aligned Russian hackers, the National Cyber Security Centre (NCSC) of the UK is encouraging all businesses to put the recommended…
Google Chrome Hit By Second Zero-Day Attack, Urgent Patch Update Released
Yet another zero-day attack on widely used software from a major technology provider. To address a security flaw that has already been publicly exploited, Google released a significant upgrade to Chrome Desktop on Friday, joining the list of vendors grappling…
Google Chrome Hit By Second Zero-Day Attack – Urgent Patch Update Released
Yet another zero-day attack on widely used software from a major technology provider. To address a security flaw that has already been publicly exploited, Google released a significant upgrade to Chrome Desktop on Friday, joining the list of vendors grappling…
Why Cybercriminals Love The Rust Programming Language
The Rust programming language has been gaining popularity over the years due to its many advantages, including its high level of control, memory safety, and flexibility. However, while these features make it a powerful tool for developers, they also make…
Goldoson Malware Hits 100 Million Downloads On Google Play Store
Goldoson malware, a new Android malware outbreak, has been found in over 60 genuine Google Play Store apps with over 100 million downloads. ONE shop, a popular South Korean third-party app marketplace, has logged eight million more installations. The rogue…
Phishing Operations Escalating As Threat Actors Utilize AI Tools
In the latest ThreatLabz Phishing Report from zero trust security firm Zscaler, the number of phishing campaigns worldwide increased by about 50% in 2022 compared to 2021, partly because of new AI tools that threaten actors could access and phishing…
Apple MacOS Devices Now Subject Of LockBit Ransomware
According to MalwareHunterTeam, the LockBit ransomware group is purportedly working on a new variant of malware that may encrypt data on Apple macOS. Although LockBit has traditionally concentrated on Linux and Windows systems, this would be the first instance of…
NCR Datacenter Affected By Massive Ransomware Attack
Ransomware struck American payments company NCR datacenter, focusing on one of its data facilities in Aloha, Hawaii. A few days after beginning to look into a “problem” with its Aloha restaurant point-of-sale (PoS) product, the company disclosed the hack on…
Google Uncovers “APT41” Tools Targeting Media And Job Sites
The data theft assaults against a Taiwanese media outlet and an Italian job search firm were carried out by the Chinese state-sponsored hacking organization APT41, which was discovered abusing the GC2 (Google Command and Control) red teaming tool. Chinese state-sponsored…
Chinese App Uses Android Flaw To Spy On Users, CISA Warns
The Chinese app for e-commerce Pinduoduo is suspected of having used a high-severity Android vulnerability as a zero-day to spy on its users, in line with the U.S. Cybersecurity and Infrastructure Security Agency (CISA). For unpatched Android devices, this security…
What Are Computer Worms And How To Prevent Them
Have you ever heard of computer worms? These malicious programs can cause havoc on your computer system and compromise your data. In the world of cybersecurity, computer worms are a serious threat. They are malware that spreads through networks, infecting…
Catch Up On News And Events That Happened This Week
Here is catching up on news and events that happened this week in the world of cybersecurity. Estonian National Charged in U.S. for Acquiring Hacking-Tools An Estonian was prosecuted for buying U.S. military and government equipment for Russia. On March…
Darktrace Research Reveals No Proof Of LockBit Compromise
On Thursday, the cybersecurity firm Darktrace released a statement after being mentioned on the LockBit ransomware group’s breach website. We learned of tweets from the cybercriminal LockBit earlier this morning, which claimed to have infiltrated Darktrace’s internal security systems and…
Kodi Data Breach Hits 400,000 Users’ Records & Private Messages
After hackers stole the Kodi Foundation’s MyBB forum database, which contained user information and private messages, and made an attempt to sell it online, the organization disclosed the Kodi data breach. Open-source, cross-platform Kodi is a media player, organizer, and…
How To Easily Cut Cloud Costs In A Time Of Soaring Expenses
European cloud costs are soaring, with analysts predicting an increase of almost a quarter this year alone. As a result, enterprises are adjusting cloud strategies to ensure greater efficiency and control. That includes more effective use of network monitoring –…
WhatsApp Improves Defense Against Malware-Based Account Takeover
Many new security features for WhatsApp have been unveiled today, one of which is called “Device Verification” and is intended to offer improved defense against account takeover (ATO) assaults. Device Verification stops malware from impersonating accounts and using stolen authentication…
Superyacht-Maker Lürssen, Targeted By Ransomware Attacks
Over the Easter weekend, a well-known manufacturer of high-end yachts for the super-wealthy was the victim of a ransomware assault; however, it is unclear if private client data was taken. German Superyacht-Maker Lürssen, established in 1875, is thought to generate…
Hyundai Data Breach In France & Italy Reveals Car Owners
Hyundai Notifies Vehicle Owners in France and Italy of Data Breach. Hyundai, a South Korean multinational automaker that sells over 500,000 automobiles a year throughout Europe, has announced a data breach that has affected car owners in France and Italy.…
Lazarus Hacker Group Evolves Means In DeathNote Campaign
DeathNote’s Lazarus Hacker Squad Evolves Its Strategies, Tools, and Targets as part of a long-running operation known as DeathNote. The Lazarus hacker Group, a North Korean threat actor, has been observed swiftly developing its tools and methods and shifting its…
Top 10 AI Jobs Taking Over With Automation
As technology evolves, artificial intelligence is becoming more prevalent in various industries. While AI technology is designed to make our lives easier, it’s also transforming job industries and taking over human responsibilities. Here we look at automation processes that AI…
Finding ChatGPT Vulnerabilities May Pay Hackers Up To $20,000
As part of its bug bounty program, introduced on April 11, 2023, OpenAI is paying white hat hackers up to $20,000 to discover security holes and ChatGPT Vulnerabilities. The ChatGPT developer introduced the effort as part of their dedication to…
Top 17 Free Online Phishing Tools
With the increase in online transactions and digital communication, the threat of phishing scams has become more prevalent than ever hence the need for phishing tools. Phishing scams have become increasingly common in recent years and can significantly threaten your…
Insider Threat and Ransomware: A Growing Issue
Ransomware is a growing epidemic. 2022 saw a slew of high-profile attacks leading to massive paydays for cybercriminals. While the headlines sound the alarm for businesses concerned about their data safety, they create allure amongst would-be thieves looking for their…
Cybercriminals To Add Android Malware On Google Play Up To $20,000
Depending on the type of malicious behaviour that online criminals demand, malware producers have established a booming market. This is where they offer to add dangerous Android malware apps to Google Play for anywhere between $2,000 and $20,000. On hacker…
Yum! Brands Report Data Breach After Ransomware Attack
A notice of security breach to warn the public has been filled by a Yum! Brands, Inc., the parent company of KFC, Pizza Hut, Taco Bell, and The Habit Burger Grills. Based on a cybersecurity incident that happened in mid-January…
Military Intel Leak Investigated By US Officials
Top US officials are investigating a military intel leak. This extraordinary level of detail in the files revealed how the United States spies on both allies and enemies. This has left U.S. officials and their foreign allies stunned and occasionally…
Estonian National Charged in U.S. for Acquiring Hacking-Tools
An Estonian national has been accused in the US of buying electronics and computer hacking tools developed in the US on behalf of the Russian military and government. Andrei Shevlyakov was detained on March 28 in Estonia. In the US,…
Detailed Analysis Of The Best Password Managers In 2023
Online security is now a top worry for all internet users in the digital era. Using secure and distinctive passwords for each of your online accounts is one of the primary steps to protecting your online identity and sensitive data.…
Review Of News And Events That Happened This Week
Here is the rundown of news and events that happened this week in the world of cybersecurity. TMX Financial Reveals 4.8 Million Persons Affected By Data Breach TMX Finance, an American consumer loan company, announced a major data breach three…
MSI Confirms Cyberattack After Fresh Demand From Ransomware Group
MSI (short for Micro-Star International), a Taiwanese PC vendor, revealed today that its network had been compromised in a cyberattack in response to claims of a ransomware attack. The Money Message ransomware group allegedly breached some of MSI’s systems earlier…