Cyberattacks have been utilizing cloud applications as an avenue of distributing malware, as per recent studies. Researchers have identified that 68% of malware downloads were derived from cloud applications for the 2nd quarter of 2021. Cloud-based misconfigurations are often a contributing factor in terms of these issues. About 66.4% of malware downloads for the 2nd...Continue Reading
Security researchers have identified a flaw towards Azure cloud, which threatens its customers about unauthorized hacker access through their data. This warning came from Microsoft themselves. The tech company said from their security team’s blog post that the flaw reported by Palo Alto Networks has already been fixed and worked on. They also added no evidence of abuse...Continue Reading
After being fired from a financial institution, New York Credit Union, Juliana Barile has been found guilty of an unauthorized intrusion of the firm’s computer system and then destroying more than 21GB of company data. Her action is reported to be a form of revenge upon her job dismissal. According to the acting US Attorney,...Continue Reading
RBI has implemented these new rules as emphasized during cases of high-profile cyberattacks against India’s technology ecosystem, including payment solution systems such as Mobikwik, Juspay, and Upstox, where customers’ payments data were put at risk. Payment companies’ outsourcing of settlement and payment-related activities to third-party operators has been reviewed and finalised by the Reserve Bank of India....Continue Reading
The health insurance industry in the US is now facing an increased risk of cyber threat attacks due to the rise of sophisticated exploitative techniques being used and developed by cybercriminals and fraudsters. This is due to the expansion of industries towards online digitization in conducting transactions, billing, and client records. Health insurers or related...Continue Reading
Ethical hackers and cybersecurity researchers disclosed more information on how multiple websites of the Indian government got hacked and breached. Just last month, researchers from the Sakura Samurai hacking group had discovered and disclosed their breach and findings via a large number of critical vulnerabilities on the cyber systems of the Indian government. The full...Continue Reading
The recent SolarWinds cyberattack exposed a third-party supply chain weakness using exploitable vulnerabilities on other widely distributed and implemented software and system offerings available in the market. Still, many enterprises have little insight into the set of suppliers currently being used in their infrastructure systems. Based on a survey conducted by BlueVoyant, out of 1,500...Continue Reading
New player ransomware – DeroHe has recently added to their victim an established computer utility developer on their list. Their recent victim is the IOBit company that started in 2004, developing various applications that focus on computer optimization and virus/malware protection. According to the report, the attack was orchestrated to the group forum of IOBit...Continue Reading
Hackney Council in the United Kingdom allegedly has their sensitive private data stolen and published online three months after the reported serious ransomware attack that they encountered last October 2020 which have affected their IT systems and network. The publishing of the stolen data has been claimed by a cyber-crime group known as Pysa/Mespinoza. They had...Continue Reading
The current trend in the dark web highlighted data leak of almost 7 million Indian cardholders’ sensitive information that has been discovered for public view. Based on different cybersecurity organizations’ testimony on the leaked database, they confirmed that the data is as large as 2 GB and includes PAN numbers sold off in the dark...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.