Category

Policy Enforcement

Policy Enforcement Page 1

Cloud storage applications malware downloads ransomware

Cloud storage applications top the most utilized avenue of malware downloads, according to recent studies

Cyberattacks have been utilizing cloud applications as an avenue of distributing malware, as per recent studies. Researchers have identified that 68% of malware downloads were derived from cloud applications for the 2nd quarter of 2021. Cloud-based misconfigurations are often a contributing factor in terms of these issues.    About 66.4% of malware downloads for the 2nd...
Continue Reading
Azure flaw vulnerability hackers unauthorized access data cloud computing

Azure vulnerability threatens customers, which may have allowed hackers unauthorized access to data

Security researchers have identified a flaw towards Azure cloud, which threatens its customers about unauthorized hacker access through their data. This warning came from Microsoft themselves. The tech company said from their security team’s blog post that the flaw reported by Palo Alto Networks has already been fixed and worked on. They also added no evidence of abuse...
Continue Reading
New York Credit Union 21GB data destroyed employee retaliation

More than 21GB of data was destroyed in retaliation as a New York Credit Union employee got fired

After being fired from a financial institution, New York Credit Union, Juliana Barile has been found guilty of an unauthorized intrusion of the firm’s computer system and then destroying more than 21GB of company data. Her action is reported to be a form of revenge upon her job dismissal.  According to the acting US Attorney,...
Continue Reading
Reserve Bank of India RBI core activities payment solution companies

Reserve Bank of India tightens rules on core activities of payment solution companies

RBI has implemented these new rules as emphasized during cases of high-profile cyberattacks against India’s technology ecosystem, including payment solution systems such as Mobikwik, Juspay, and Upstox, where customers’ payments data were put at risk.  Payment companies’ outsourcing of settlement and payment-related activities to third-party operators has been reviewed and finalised by the Reserve Bank of India....
Continue Reading
cyber threat attacks customer data theft US Health Insurance Industry 

Increasing risk of customer data theft on US Health Insurance industry 

The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records.  Health insurers or related...
Continue Reading
ethical hackers researchers hacked indian government critical vulnerabilities flaws

Researcher team hacked Indian government websites by using exposed git and env files

Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...
Continue Reading
vendor supply chain knowledge gap third-party risk assessment

Third-party cyber risk, The vendor supply chain knowledge gap

The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...
Continue Reading
iobit ransomware DeroHe vulnerability brand abuse

IOBit group forum hacked to spread ransomware to members

New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection.  According to the report, the attack was orchestrated to the group forum of IOBit...
Continue Reading
hackney council UK London Compromised Data Stolen Data Published Pysa

Data Stolen from Hackney Council in London published online

Hackney Council in the United Kingdom allegedly has their sensitive private data stolen and published online three months after the reported serious ransomware attack that they encountered last October 2020 which have affected their IT systems and network.   The publishing of the stolen data has been claimed by a cyber-crime group known as Pysa/Mespinoza. They had...
Continue Reading
7 Million Indian Credit Debit Card Data Leak Dark Web

Credit and debit card data leak of 7 million Indian in the Dark Web

The current trend in the dark web highlighted data leak of almost 7 million Indian cardholders’ sensitive information that has been discovered for public view. Based on different cybersecurity organizations’ testimony on the leaked database, they confirmed that the data is as large as 2 GB and includes PAN numbers sold off in the dark...
Continue Reading
1 2 3 7