Tag: Information Security Buzz

NextGen Healthcare Hit By Data Breach, Over 1M+ Details Exposed

Hackers broke into the computers of NextGen Healthcare, an American provider of electronic health record software, and stole the personal information of over a million patients. NextGen Healthcare reported that hackers accessed the personal information of 1.05 million patients, including…

FinServ Ahead Of The Pack In API Transformation

The Financial Services industry (FinServ) has left its mark on the API landscape and continues to provide new reasons for innovation. From the first UK bank that pioneered Open Banking to the booming mobile payment industry, FinServ has prompted –…

Protecting DevOps Workflow From The Threat Of Malicious Packages

The compound word, DevOps, defines an extensive procedure and culture that comprises the process and technology of software planning/development (Dev) and IT operations (Ops). DevOps has helped shorten the time for organizational system development, improving the running of software while attaining…

Summary Of News and Events That Happened This week

A summary of news and events that happened this week with ransomware, data breaches, rapid response security, etc. Chatgpt Triumphantly Returns To Italy After …… Tech businesses and regulatory authorities must communicate and cooperate to resolve ChatGPT’s prohibition in Italy…

Constellation Struck By Ransomware Attack, ALPHV Lays Claim

On Thursday, Canadian software firm Constellation Software reported that threat actors had broken into some of its networks and stolen personal information and corporate data. A small number of systems used for internal financial reporting and related data storage by…

8 Top Authenticator App For iOS and Andriod In 2023

Recent data breaches have demonstrated that relying solely on passwords may be insufficient. Hence, the need for online security. A single password is frequently insufficient to protect sensitive data, such as what’s in your bank account or social media accounts.  This…

FBI Uncovers 9 Crypto Exchanges In Ransomware Laundering

Nine cryptocurrency exchange websites that enabled money laundering for scammers and hackers, including ransomware operators, have been taken down by the FBI and Ukrainian police. According to a press release from the FBI, the ‘crypto exchanges’ operation was supported by…

Optimising Cyber Security Costs In A Recession

Businesses today are facing two acute challenges – the economy and cybercrime. This is forcing CISOs to make some tough decisions about spending. The UK government’s Cyber Security Breaches Survey 2022 found that in the last 12 months, 39% of UK…

T-Mobile Data Breach, The Second Since The Year 2023

Although this breach only affected 1,000 customers as opposed to the 37 million affected by the previous one, T-Mobile US Inc. disclosed another data breach, its second disclosed breach in 2023. This is the eighth data breach since 2018. 836…

Ukrainian Government Targeted with Fake Windows Update

Various government entities in the nation have been the target of cyberattacks by Russian nation-state hackers, all based on the Computer Emergency Response Team of Ukraine (CERT-UA). APT28, also known as Fancy Bear, Forest Blizzard, FROZENLAKE, Iron Twilight, Sednit, and…

Weekly Summary Of News And Events This Week

A summary of news and events that happened this week with ransomware, data breaches, the banning of developers’ accounts, etc. Yellow Pages Canada Alerts of Cyberattack  The Black Basta cyber attack on Yellow Pages Canada shows the continued threat of…

A Comprehensive Look At Email-Based Threats In 2023

It follows that vectors with greater internet exposure will also attract more attention from threat actors. Because of this, malicious actors frequently exploit public email servers, and a wide variety of cyber dangers can spread through them. We found some…

50 Crypto Wallets Targeted by Atomic MacOS Malware

Security professionals have issued alerts regarding a new type of malware that targets MacOS devices in an effort to steal sensitive data, including credit card details, credit card expiration dates, and information from over 50 Bitcoin browser extensions. The threat,…

35M Downloads Of Android Minecraft Clones Spreads Adware

A group of 38 Minecraft-like games on Google Play attacked devices with the Android adware “HiddenAds,” which loaded ads in the background without the user’s knowledge. This made money for the games’ creators. Minecraft is a successful sandbox game with…

Good, Better And Best Security

What does a “good” cyber-security programme look like? How can we, in our role as Chief Information Security Officer (CISO), work to improve the effectiveness of the policies and practices implemented in our organisations? Measuring activity does not necessarily have…

RCE Attacks Against Thousands Of Apache Superset Servers

At its default settings, Apache Superset is vulnerable to authentication bypass and remote code execution, allowing attackers to read and alter data, gather passwords, and issue commands. Apache Superset is a top-level project of the Apache Software Foundation since 2021.…

Saas Security: The Need For Continuous Sustenance

Data has emerged as a company’s most essential asset in the modern world. Every security team prioritizes protecting sensitive data, but changes to the perimeter have forced teams to adapt how they approach enterprise security. SaaS adoption has skyrocketed in…

VMware Resolves Crucial Pwn2Own Zero-Day Exploit Chain

To address zero-day vulnerabilities that might be used to achieve code execution on computers using unpatched versions of VMware’s Workstation and Fusion software hypervisors, the company has provided security upgrades. On the second day of the Pwn2Own Vancouver 2023 hacking…

Large 2,200x DDoS Amplification Assault Due To New SLP Flaw

Threat actors can conduct enormous denial-of-service attacks with 2,200X amplification thanks to a new reflected Denial-of-Service (DoS) increasing its vulnerability in the Service Location Protocol (SLP). Researchers at BitSight and Curesec identified this weakness as CVE-2023-29552. They claim that around…

New Ransomware Attack Hits Health Insurer Point32Health

A ransomware attack affecting several of its systems is being dealt with this week by a New England health insurance company that provides services to over two million people. According to Point32Health, created through the merger of Harvard Pilgrim Health…

Daggerfly Cyberattack Campaign Strikes African Telecom Providers

African Telecom Service Providers Targeted by Daggerfly Cyberattack Campaign. Recently, the Daggerfly cyberattack campaign, aimed at numerous institutions worldwide, shocked the cybersecurity community. Experts describe this sophisticated attack effort as one of the most sophisticated and hazardous cyberattacks since it has caused…

Raspberry Robin Adopts Initiates Evasion Techniques

Security researchers at Check Point Research (CPR) have released an advisory that details the unique evasion techniques employed by threat actors who rely on the Raspberry Robin malware to avoid detection. In the advisory published on Tuesday, CPR experts explain the novel malware…

Why Cybercriminals Love The Rust Programming Language

The Rust programming language has been gaining popularity over the years due to its many advantages, including its high level of control, memory safety, and flexibility. However, while these features make it a powerful tool for developers, they also make…

Apple MacOS Devices Now Subject Of LockBit Ransomware

According to MalwareHunterTeam, the LockBit ransomware group is purportedly working on a new variant of malware that may encrypt data on Apple macOS. Although LockBit has traditionally concentrated on Linux and Windows systems, this would be the first instance of…

NCR Datacenter Affected By Massive Ransomware Attack

Ransomware struck American payments company NCR datacenter, focusing on one of its data facilities in Aloha, Hawaii. A few days after beginning to look into a “problem” with its Aloha restaurant point-of-sale (PoS) product, the company disclosed the hack on…

Chinese App Uses Android Flaw To Spy On Users, CISA Warns

The Chinese app for e-commerce Pinduoduo is suspected of having used a high-severity Android vulnerability as a zero-day to spy on its users, in line with the U.S. Cybersecurity and Infrastructure Security Agency (CISA). For unpatched Android devices, this security…

What Are Computer Worms And How To Prevent Them

Have you ever heard of computer worms? These malicious programs can cause havoc on your computer system and compromise your data. In the world of cybersecurity, computer worms are a serious threat. They are malware that spreads through networks, infecting…

Catch Up On News And Events That Happened This Week

Here is catching up on news and events that happened this week in the world of cybersecurity. Estonian National Charged in U.S. for Acquiring Hacking-Tools An Estonian was prosecuted for buying U.S. military and government equipment for Russia. On March…

Darktrace Research Reveals No Proof Of LockBit Compromise

On Thursday, the cybersecurity firm Darktrace released a statement after being mentioned on the LockBit ransomware group’s breach website. We learned of tweets from the cybercriminal LockBit earlier this morning, which claimed to have infiltrated Darktrace’s internal security systems and…

How To Easily Cut Cloud Costs In A Time Of Soaring Expenses

European cloud costs are soaring, with analysts predicting an increase of almost a quarter this year alone. As a result, enterprises are adjusting cloud strategies to ensure greater efficiency and control. That includes more effective use of network monitoring –…

WhatsApp Improves Defense Against Malware-Based Account Takeover

Many new security features for WhatsApp have been unveiled today, one of which is called “Device Verification” and is intended to offer improved defense against account takeover (ATO) assaults. Device Verification stops malware from impersonating accounts and using stolen authentication…

Superyacht-Maker Lürssen, Targeted By Ransomware Attacks

Over the Easter weekend, a well-known manufacturer of high-end yachts for the super-wealthy was the victim of a ransomware assault; however, it is unclear if private client data was taken. German Superyacht-Maker Lürssen, established in 1875, is thought to generate…

Hyundai Data Breach In France & Italy Reveals Car Owners

Hyundai Notifies Vehicle Owners in France and Italy of Data Breach. Hyundai, a South Korean multinational automaker that sells over 500,000 automobiles a year throughout Europe, has announced a data breach that has affected car owners in France and Italy.…

Lazarus Hacker Group Evolves Means In DeathNote Campaign

DeathNote’s Lazarus Hacker Squad Evolves Its Strategies, Tools, and Targets as part of a long-running operation known as DeathNote. The Lazarus hacker Group, a North Korean threat actor, has been observed swiftly developing its tools and methods and shifting its…

Top 10 AI Jobs Taking Over With Automation

As technology evolves, artificial intelligence is becoming more prevalent in various industries. While AI technology is designed to make our lives easier, it’s also transforming job industries and taking over human responsibilities. Here we look at automation processes that AI…

Top 17 Free Online Phishing Tools

With the increase in online transactions and digital communication, the threat of phishing scams has become more prevalent than ever hence the need for phishing tools. Phishing scams have become increasingly common in recent years and can significantly threaten your…

Insider Threat and Ransomware: A Growing Issue

Ransomware is a growing epidemic. 2022 saw a slew of high-profile attacks leading to massive paydays for cybercriminals. While the headlines sound the alarm for businesses concerned about their data safety, they create allure amongst would-be thieves looking for their…

Military Intel Leak Investigated By US Officials

Top US officials are investigating a military intel leak. This extraordinary level of detail in the files revealed how the United States spies on both allies and enemies. This has left U.S. officials and their foreign allies stunned and occasionally…

Review Of News And Events That Happened This Week

Here is the rundown of news and events that happened this week in the world of cybersecurity. TMX Financial Reveals 4.8 Million Persons Affected By Data Breach TMX Finance, an American consumer loan company, announced a major data breach three…

OpenAI To Proffer Solutions To Italy’s ChatGPT Ban

Regulators announced Thursday that the company behind ChatGPT would submit ways to address the data protection issues that prompted a temporary Italian ban on the artificial intelligence chatbot. This means that OpenAI to profer solutions to Italy’s ChatGPT ban. Last…

How HTTPS Works And Overview Of Its Components

In the modern world, technology has enabled people to connect and communicate virtually anywhere. With the internet being a critical part of our lives, we transmit and receive a vast amount of sensitive data daily, from banking information to personal…

YouTube Alerts About Phishing Emails that Appear Authentic

The authentic no-reply@youtube.com email address is being used in a new phishing scam that YouTube is investigating and alerting users to. The scam attempts to trick users into divulging their login information. One of the biggest video-sharing websites in the…

Marketplace 600K Records Leaked by Database Snafu

More than 600,000 records from a well-known online store have leaked due to a database bug. Concerns have been made about the security and privacy of users’ personal information in the wake of the incident brought on by a system…

OneNote Security Tightened By Microsoft To Block 120 File Extensions

After allegations that the note-taking service is being increasingly misused for malware transmission, Microsoft has revealed steps to automatically remove embedded files with “dangerous extensions” in OneNote security. Users were previously presented with a window warning them that opening specific…

Western Digital Reveals Network Breach, My Cloud Is Unavailable

Western Digital reported today that a compromise in its network allowed an unauthorized person access to several corporate systems. The network security vulnerability was discovered last Sunday, March 26, according to a press release from the California-based manufacturer of computer…

Summary Of News And Events That Happened This Week

Here is the rundown of news and events that happened this week in the world of cybersecurity. 14 Million Customer Details Breached In Latitude Financial Firm A significant security breach took the personal data of 14 million Australians and New…

Tor Browser: What Is It? And How It Can Aid In Identity Protection

Privacy and anonymity are increasingly becoming rare commodities in today’s digitally-driven world. With governments and corporations tracking our online activities, protecting our identity and online data has become imperative. One such action is using the Tor Browser without disclosing your…

FDA Sets New Medical Devices Cybersecurity Standards

Beginning on October 1, the Food and Drug Administration(FDA) will “refuse to accept” medical devices and associated systems due to cybersecurity concerns, according to a March 29 announcement from the agency. Beginning March 29, all new device submissions must have…

Supply Chain Attack By Hackers On 3CX Desktop App

The 3CX desktop app is being utilized with a digitally signed and trojanized version by an ongoing supply chain attack to target the customers of the business. 3CX is a software development company that specializes in VoIP IPBX, and its…