The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records. Health insurers or related...Continue Reading
A recent cybersecurity report says there’s been a 2,000% increase in the number of new malware written using the GoLang programming language since 2017. Both state-sponsored and non-state threat actor groups have written the GoLang-based malware and are actively adding this to their toolset. The PSYA ransomware is one of the newest malware found and...Continue Reading
A new type of ransomware syndicate has been classified by a cybersecurity firm named Privateers. These ransomware syndicates compose of threat actors that are financially motivated and government-backed cybercriminals prosecuted and hunted by law enforcement; however, they do not have the same status as state-sponsored APT hacking groups. According to the report, the Privateers...Continue Reading
The number of cyberattacks against ICS SCADA (Industrial Control Systems Supervisory Control and Data Acquisition) system products used by industrial organizations worldwide has rapidly increased. Hence, many cybersecurity firms and whitehat hackers highlighted the risks of attack that target OT (Operational Technology) network used in utilities. Among the most significant cyber-attack against industrial organizations...Continue Reading
A surge of cyberattacks on cryptocurrency businesses has been seen recently by the cybersecurity community. We all know that cryptocurrencies are fully decentralized. They have no authority that monitors crypto activities and transactions, which provides a free hand to threat actors to conduct attacks at their will. This fact, in addition to the soaring value...Continue Reading
Clop ransomware group attacked Accellion, one of the companies that offer File Transfer Appliance. Typically, transferring files happens via email. However, emails have limitations, particularly when it comes to large attachments and sensitive data. Some companies are now using File Transfer Appliance (FTA) installed on a private cloud, on-premises, or hosted to securely manage and...Continue Reading
Microsoft recently warned organizations of a new unique attack campaign that abuses contact forms found on websites to deliver financial malware to businesses through email that poses as email of legal threats. This new campaign is another trick of adversaries to abuse business infrastructures to evade and bypass installed security protection systems. The emails aim...Continue Reading
Another instance of a supply chain attack has been reported; this time, it’s on the Git repository of PHP and their data storage. The hacked repository and the codebase contents were tampered with. The incident’s investigation is ongoing and more details will be revealed in the upcoming days. On the initial reports, the malicious activity...Continue Reading
A company’s sensitive information is stored on either local machine, cloud servers, and enterprise databases. A data breach can be defined as viewing an individual’s personal medical file without authorization or sharing a sensitive document without permission. When a company accidentally exposes data, it might be due to unintentional disclosure of data inside the job...Continue Reading
Cybercrime (CC) has never been projected as high as last fiscal year compared to the previous years. Historical data confirms the enormous leap of numbers on reported cases in various types of attack known by the cybersecurity experts. Incidents of repurposed tactics, newer and more lethal approach of adversaries were recorded complimenting the uprising cases...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.