Category

Data Breach

Data Breach page 1

Fraudsters user passwords data breach online phishing

Fraudsters harvest user passwords via data breach and online phishing

It is a usual scenario where our passwords are required to be changed at times of data breach. Still, the truth is that cybercriminals take advantage of this situation by harvesting all the vulnerable target information before victims actually become aware of what’s happening. Learn more about how the data breaching process happens here.   Passwords have undeniably become the source of protection and authentication for...
Continue Reading
cyber threat attacks customer data theft US Health Insurance Industry 

Increasing risk of customer data theft on US Health Insurance industry 

The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records.  Health insurers or related...
Continue Reading
whitehat hackers breach network north america utility ICS SCADA

Whitehat hackers successfully breached the network of North American utility

The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities.   Among the most significant cyber-attack against industrial organizations...
Continue Reading
Accellion data breach Clop ransomware malware File Transfer Appliance

The average ransomware payment increases due to the Accellion data breach

Clop ransomware group attacked Accellion, one of the companies that offer File Transfer Appliance. Typically, transferring files happens via email. However, emails have limitations, particularly when it comes to large attachments and sensitive data. Some companies are now using File Transfer Appliance (FTA) installed on a private cloud, on-premises, or hosted to securely manage and...
Continue Reading
facebook hacked leaked compromised data social media vulnerability exploit

Facebook Hacked… Again? Maybe we are not that surprised

Hacked and leaked, ever since the Cambridge-Analytica issue erupted, we have seen never-ending posts in the different dark web and criminal forums about data peddled for a price about Facebook. The social media giant became a target for social engineer actors from other countries and various blackhat hacking skills. This 2020, iZOOlogic downloaded leaked Facebook...
Continue Reading
verkada surveillance camera hacked breach Arson Cats APT69420

Customers not affected after Verkada surveillance camera breach

This week’s trending topic in the cybersecurity community is the successful intrusion of the collective hacktivist APT69420 or Arson Cats that proves no one is secured. Though it is a small group of hackers, they could penetrate Verkada Security Company, a known recipient of Silicon Valley funding for its technology advancement when it comes to...
Continue Reading
ethical hackers researchers hacked indian government critical vulnerabilities flaws

Researcher team hacked Indian government websites by using exposed git and env files

Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...
Continue Reading
SII Bharat Biotech Stone Panda APT10 Chinese State Hackers

SII and Bharat Biotech, Covid19 vaccine makers targeted by Chinese hackers

The Chinese hacking group Stone Panda or APT10 has been identified as responsible for the attacks on Indian vaccine makers, as confirmed by a cybersecurity firm. The hacking group had identified flaws and vulnerabilities in the IT infrastructure and software supply chain of the world’s largest vaccine maker companies, Serum Institute of India or SII...
Continue Reading
Imobiliare Romania Real Estate Data Breach vulnerability misconfiguration

Imobiliare, Romania’s largest Real Estate company suffers Data Breach

Every day, companies faced security challenges in maintaining their data secured from cyber-attacks. A data breach results from successful cyber-attacks that permit cyber criminals to access a company’s sensitive data. The exploitation of the data can happen anytime to any organization. However, cyber-attack is not the only cause of why data breaches are happening worldwide....
Continue Reading
hackney council UK London Compromised Data Stolen Data Published Pysa

Data Stolen from Hackney Council in London published online

Hackney Council in the United Kingdom allegedly has their sensitive private data stolen and published online three months after the reported serious ransomware attack that they encountered last October 2020 which have affected their IT systems and network.   The publishing of the stolen data has been claimed by a cyber-crime group known as Pysa/Mespinoza. They had...
Continue Reading
1 2 3 9