According to the Health Sector Cybersecurity Coordination Center, the Everest Ransomware group is a threat profile of the recent ransomware attack that took place at Gramercy Surgery Center in New York. The Everest Ransomware group is behind the recent…
Category: CySecurity News – Latest Information Security and Hacking Incidents
QR Code Phishing: How Cybercriminals Exploit Trust via Quishing
Today, QR codes have become a familiar sight. And why not, it makes our daily tasks easy. From making payments to accessing websites, these square patterns of black and white squares offer convenience and efficiency. However, cybercriminals have found a…
North Korea Exploited Windows Zero-Day Vulnerability to Install Fudmodule
North Korea’s Lazarus hacking group has once again exploited a zero-day vulnerability in Microsoft Windows to deploy malware on targeted devices. On August 13, Microsoft addressed this issue with its monthly Patch Tuesday updates, fixing a flaw in the…
Worried About Cash App Breach? These Three Steps Can Keep Your Financial Data Safe
You’re not alone if the most recent Cash App data hack made you nervous. In 2022, the parent company of Block, the peer-to-peer payment platform, failed to prevent unauthorised access to Cash App customer accounts. Cash App agreed to…
16 Years of Cybercrime: The Story of Greasy Opal’s CAPTCHA Solver
Certain tools and techniques have been persistent, continually adapting to new challenges and threats. One such tool is the CAPTCHA solver developed by Greasy Opal, a name that has become synonymous with cybercrime over the past 16 years. This blog…
New Styx Stealer Malware Targets Browsers and Instant Messaging for Data Theft
A new malware strain known as Styx Stealer has recently emerged, posing a significant threat to online security. Discovered in April 2024, Styx Stealer primarily targets popular browsers based on the Chromium and Gecko engines, such as Chrome and…
Misconfigured Access Controls in NetSuite Stores Cause Major Data Breach
Microsoft’s apps for MacOS have been exploited by hackers recently to expose a critical vulnerability. It is believed that hackers have been exploiting vulnerabilities in popular applications, such as Microsoft Outlook and Teams, to spy on Mac users. In…
Cybercriminals Place 85-Year-Old Woman Under ‘Digital Arrest’ in Hyderabad, Cheat Her of ₹5.9 Crore
Cybercriminals recently targeted an 85-year-old woman from the city, subjecting her to what can be described as a ‘digital arrest’ and extorting a staggering ₹5.9 crore from her. This elaborate scam involved convincing the elderly woman that her Aadhaar…
Oil Giant Halliburton Hit by Cyberattack, Certain Systems Affected
On Friday, oil firm Halliburton revealed further details to regulators regarding a recent attack that forced the shutdown of critical systems. The company told news outlets that it was struck by a cyberattack on Wednesday, which disrupted operations at…
Cyble Research Reveals Near-Daily Surge in Supply Chain Attacks
The prevalence of software supply chain attacks is on the rise, posing significant threats due to the extensive impact and severity of such incidents, according to threat intelligence researchers at Cyble. Within a six-month span from February to mid-August,…