"WebTPA Data Breach Impacts 2.4 million Insurance Policyholders"

"WebTPA Data Breach Impacts 2.4 million Insurance Policyholders"

The U.S. Department of Health and Human Services recently announced that the WebTPA Employer Services (WebTPA) data breach disclosed earlier this month impacts nearly 2.5 million individuals. Some of the impacted people are customers at large insurance companies. WebTPA is a GuideWell Mutual Holding Corporation subsidiary and a third-party administrator (TPA) that provides customized administrative services to health plans and insurance companies. WebTPA said the threat actor had access to personal data for five days between April 18 and April 23, 2023.

Submitted by Adam Ekwall on

Patient Data at Risk in MediSecure Ransomware Attack

Patient Data at Risk in MediSecure Ransomware Attack

Australian healthcare company MediSecure has recently suffered a “large scale” ransomware attack, putting individuals’ personal and health information at risk. The electronic prescriptions provider confirmed the incident in a statement on May 16, which it admitted has impacted the personal and health information of individuals. The company did not give any information about the nature of the information that has been potentially accessed. Medisecure’s website and phone lines are also out of operation currently.

Submitted by Adam Ekwall on

"Threat Actors Abuse GitHub to Distribute Multiple Information Stealers"

"Threat Actors Abuse GitHub to Distribute Multiple Information Stealers"

A malicious campaign has used a legitimate GitHub profile to spread information-stealing malware. Russian-speaking threat actors have impersonated 1Password, Bartender 5, and other legitimate applications to distribute Atomic macOS Stealer (AMOS), Vidar, Lumma, and Octo malware. The malware operations shared Command-and-Control (C2) infrastructure, suggesting the use of a centralized setup in cross-platform attacks to increase efficiency.

Submitted by Gregory Rigby on

"Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks"

"Flaw in Wi-Fi Standard Can Enable SSID Confusion Attacks"

According to researchers at Belgium's KU Leuven, attackers can exploit a fundamental design flaw in the IEEE 802.11 Wi-Fi standard to trick victims into connecting to a less secure wireless network. The Virtual Private Network (VPN) review site Top10VPN, which worked with one of the KU Leuven researchers to release details about the flaw, warns that such attacks increase the risk of traffic interception and manipulation. The flaw impacts Wi-Fi clients across all Operating Systems (OS).

Submitted by Gregory Rigby on

"Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines"

"Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines"

Researchers have found almost a dozen security flaws that affect the GE HealthCare Vivid Ultrasound product family. The exploitation of these vulnerabilities could allow malicious actors to tamper with patient data and install ransomware. From implanting ransomware on the ultrasound machine to accessing and manipulating patient data on vulnerable devices, the Operational Technology (OT) security vendor Nozomi Networks said these flaws have many effects.

Submitted by Gregory Rigby on

"Third Chrome Zero-Day Patched by Google Within One Week"

"Third Chrome Zero-Day Patched by Google Within One Week"

Google recently announced the release of Chrome 125 to the stable channel with patches for nine vulnerabilities, including four reported by external researchers. The most critical bug is CVE-2024-4947, a high-severity type confusion flaw in the V8 JavaScript engine that has already been exploited. Google noted that successfully exploiting the vulnerability could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.

Submitted by Adam Ekwall on

"SugarGh0st RAT Variant Used in Targeted AI Industry Attacks"

"SugarGh0st RAT Variant Used in Targeted AI Industry Attacks"

Researchers have discovered a sophisticated cyber campaign targeting US Artificial Intelligence (AI) organizations. "UNK_SweetSpecter," a May 2024 campaign, uses the "SugarGh0st RAT," a "Gh0stRAT"-based Remote Access Trojan (RAT). This variant, which Chinese-speaking threat actors have used, now targets AI-related entities. Proofpoint reported that the attacks used a free email account to send AI-themed lures to open zip archives. This article continues to discuss the campaign involving the SugarGh0st RAT variant.

Submitted by Gregory Rigby on

"Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea"

"Kimsuky Hackers Deploy New Linux Backdoor in Attacks on South Korea"

The North Korean hacker group "Kimsuky" is now using "Gomir," a new Linux malware and version of the GoBear backdoor. Kimsuky is a state-sponsored threat actor connected to North Korea's military intelligence, the Reconnaissance General Bureau (RGB). Symantec researchers found a Linux variant of the GoBear backdoor while investigating a campaign reported by researchers at the SW2 threat intelligence company in early February 2024 that targeted South Korean government organizations. This article continues to discuss the Kimsuky hackers' use of a new Linux backdoor.

Submitted by Gregory Rigby on

"Cloud Security Incidents Make Organizations Turn to AI-Powered Prevention"

"Cloud Security Incidents Make Organizations Turn to AI-Powered Prevention"

According to Check Point, 61 percent of organizations reported cloud security breaches in the past year, up from 24 percent the year before. Over 800 cloud and cybersecurity professionals provided their insights to the 2024 Cloud Security Report.

Submitted by Gregory Rigby on

"Personal Information Stolen in City of Wichita Ransomware Attack"

"Personal Information Stolen in City of Wichita Ransomware Attack"

In a new update, the City of Wichita, Kansas, has revealed that files containing personal information were stolen in a ransomware attack in early May. The city disclosed the incident on May 5, when certain systems were shut down as a containment measure to stop the spreading of file-encrypting ransomware deployed during the attack. This week, Wichita revealed that, between May 3 and 4, the attackers copied certain files from its network, and those files contained personal information.

Submitted by Adam Ekwall on
Subscribe to