Healthcare institutions have millions of connected devices exposed to critical vulnerabilities. These vulnerabilities allow threat actors to disrupt medical tools and patient monitors, including the Internet of Things (IoT) devices that have control over systems and equipment inside health facilities like ventilation systems. The communications protocol TCP/IP stacks are also utilised in other industries besides the...Continue Reading
An Initial Access Broker (IAB) dubbed the “Zebra2104” was discovered by the security researchers linked to three threat groups involved in phishing scams and ransomware activities. Zebra2104 is found to be providing entry points to ransomware threat groups such as Phobos, StrongPity APT, and MountLocker. The entry points were also provided to several compromised organisations in Turkey and Australia. Turkish healthcare firms and other smaller companies have been targeted by the StrongPity APT,...Continue Reading
New reports are published by the FBI pertaining to ransomware groups observed to exploit special financial events to perform their attacks. The ransomware threat groups use financial events such as acquisitions and mergers to target institutions and compel them to pay ransom demands. The FBI stated that ransomware groups research and acquire the victim’s publicly available data before executing...Continue Reading
WordPress is among the most renowned content management systems (CMS) globally, with an estimate of more than 64 million clients and 400 million daily visitors. Meanwhile, recent reports reveal that GoDaddy, the CMS’s top web hosting tool among clients, has compromised about 1.2 million WordPress client information to a data breach. As described by GoDaddy’s chief information security officer (CISO) in...Continue Reading
A flash alert was sent by the US Federal Bureau of Investigation (FBI) to warn private industries about the HelloKitty ransomware gang, also known as FiveHands, adding DDoS attack to their collection of extortion strategies. The warning also stressed that the threat actors would take down the website of their victims if they did not pay the ransom...Continue Reading
Following its emergence this year, the Cring ransomware threat group remained active in the cybercrime landscape by attacking old ColdFusion servers and VPNs. As per security experts, a unique quality of their ransomware attack involves their specialisation in using old vulnerabilities for their exploit activities. Furthermore, analysts said that Cring ransomware’s exploitation of old VPN and server vulnerabilities must be a wake-up call...Continue Reading
New reports were published by security analysts recently, stressing the upsurge of cyber threats this year, including cyberattacks against HTTPS, tech, and retailer firms. According to the report, threats against HTTPS have grown to over 314%, while threats against tech companies have dramatically surged to 2,300%. Retail companies, on the other hand, grew to 800% of exposure to cyber...Continue Reading
Cybersecurity leaders have conducted a study that shows the alarming hike of domain name system (DNS) attacks against organisations for 2021. The survey result revealed that within the past 12 months, 72% of participants had experienced a DNS cyberattack. 61% of victimised organisations have suffered from multiple attacks, while 11% are attacked regularly. In terms of cyberattack recovery, one-third of the respondents said...Continue Reading
According to a researcher, a website dedicated to sharing an original created digital design called Thingiverse has leaked 36-gigabyte backup files containing 200,000 email addresses and other personal information. The data dump is currently being circulated on a known hacking forum. The Thingiverse purpose is to give free, open-source hardware designs that can be licensed under the Creative Commons licenses or General Public...Continue Reading
Recently, data breached in the after-sales service system in India was confirmed by the Taiwan-tech company Acer. An Acer Corporate spokesperson stated that they immediately initiated their security protocols and conducted a full scan of their system after the confirmed detection of the breaching. They also added that they are notifying all potentially affected individuals in the Indian-based Acer company. ...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.