News
-
"Sandworm Hackers From Russia Distribute Malware by Posing as Ukrainian Telecoms"A threat cluster linked to the Russian nation-state actor Sandworm is attacking Ukraine with generic malware while posing as telecommunications companies. Recorded Future discovered a new UAC-0113 infrastructure imitating Datagroup and EuroTransTelecom…
-
"Harvest Now, Decrypt Later Attacks Pose a Security Concern as Organizations Consider Implications of Quantum Computing"According to a new Deloitte study, 50.2 percent of professionals at organizations considering the benefits of quantum computing believe their organizations are vulnerable to 'Harvest Now, Decrypt Later' (HNDL) cybersecurity attacks. Threat actors use…
-
"Google Tool for e-commerce Sites Being Abused by Hackers Stealing Card Data, Personal Info"According to a new Recorded Future report, hackers are abusing Google Tag Manager (GTM) containers to install malicious e-skimmers capable of stealing payment card data and Personally Identifiable Information (PII) from shoppers on e-commerce sites.…
-
"Report: US Businesses Experience 42 Cyberattacks per Year"Keeper Security has released its second annual 2022 US Cybersecurity Census Report, mapping the evolving cybersecurity landscape based on expert insights from over 500 IT decision-makers in US businesses. The findings from this year show that, while…
-
"American Airlines Reveals Data Breach Incident Occurred After Employee Email Was Compromised"American Airlines faced a data breach in which attackers hacked an unknown number of staff email accounts and gained access to highly sensitive personal data. In notification letters sent to customers, the airline clarified that there is no proof that…
-
"Revolut Data Breach: 50,000+ Users Affected"Revolut, the financial technology company behind the widely used banking app of the same name, has experienced a data breach, which was followed by phishing attacks designed to exploit the situation. On September 11, some Revolut customers reported…
-
"Cyberattackers Make Waves in Hotel Swimming Pool Controls"After the hacktivist group GhostSec claimed to have breached an Israeli hotel pool controller, a team of researchers at Otorio decided to investigate further. The cyberattack group did not provide details about the Operational Technology (OT) breach, but…
-
"MFA Fatigue: Hackers' New Favorite Tactic in High-Profile Breaches"Hackers are increasingly using social engineering attacks to gain access to corporate credentials and infiltrate large networks. As the use of multi-factor authentication (MFA) continues to grow, a technique called MFA Fatigue is growing more popular.…
-
"Emotet Botnet Started Distributing Quantum and BlackCat Ransomware"Ransomware-as-a-Service (RaaS) groups such as Quantum and BlackCat are now using the Emotet malware. Emotet began as a banking Trojan in 2014, but updates added to it have transformed it into a highly potent threat capable of downloading other payloads…
-
"Phishing Attacks Targeting US Government Have Evolved in Sophistication, Confense Reports"Phishing attacks on the US Departments of Labor, Commerce, and Transportation have become more convincing and evasive, according to Confense Intelligence. The credential phishing campaigns, which have been active since mid-2019, have been observed in…
-
"DoD Cyber Crime Center, US Cyber Command Develop Interagency Collaboration"The Department of Defense (DoD) Cyber Crime Center (DC3) Operations Enablement Directorate (OED) and the US Cyber Command (USCC) have formed an interagency collaborative partnership to strengthen efforts supporting national security matters with a…
-
"New Model Provides Smishing Protection in Swahili"Smishing (SMS phishing) extends scams to mobile devices by sending text messages impersonating organizations, such as banks, in order to obtain victims' personal information. Smishing is a major cybersecurity concern in Africa, which has the world's…