According to the Bhubaneswar-Cuttack Police Commissionerate, there is an enormous amount of SIMbox crime going on in the Laxmisagar area of the city. During the period of about 5 to 6 months, this racket has been active, illegally intercepting…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Critical Jenkins RCE Vulnerability: A New Target for Ransomware Attacks
Recently, the CISA (Cybersecurity and Infrastructure Security Agency) warned about a critical remote code execution (RCE) vulnerability in Jenkins, a widely used open-source automation server. This vulnerability, CVE-2024-23897, has been actively exploited in ransomware attacks, posing a significant risk to…
AI-Enhanced Crypto Scams: A New Challenge for ASIC
The Australian Securities and Investments Commission (ASIC) has been at the forefront of combating crypto scams, working tirelessly to protect consumers from fraudulent schemes. Despite a reported decline in the number of scams since April, ASIC continues to emphasize the…
Lessons for Banks from the Recent CrowdStrike Outage
The recent disruption caused by CrowdStrike has been a wake-up call for financial institutions, highlighting that no cybersecurity system is entirely foolproof. However, this realisation doesn’t lessen the need for rigorous preparation against potential cyber threats. What Happened with…
New Report Reveals Rising Attacks on macOS Systems
A new report published by Intel471 reveals that macOS is increasingly being targeted by threats developing malware specific to the operating system or using cross-platform languages to achieve their goals on macOS computers through malware being developed for Mac…
Here’s Why Ransomware Actors Have a Upper Hand Against Organisations
Successful ransomware assaults are increasing, not necessarily because the attacks are more sophisticated in design, but because attackers have found that many of the world’s largest companies lack adequate resilience to basic safety measures. Despite huge efforts in cybersecurity…
Timeline of the Ransomware Attack on Change Healthcare: How It Unfolded
Earlier this year, a ransomware attack targeted Change Healthcare, a health tech company owned by UnitedHealth, marking one of the most significant breaches of U.S. health and medical data in history. Months after the breach occurred in February, a…
RansomHub Deploys EDRKillShifter Malware to Disable Endpoint Detection Using BYOVD Attacks
Sophos security researchers have identified a new malware, dubbed EDRKillShifter, used by the RansomHub ransomware group to disable Endpoint Detection and Response (EDR) systems in attacks leveraging Bring Your Own Vulnerable Driver (BYOVD) techniques. This method involves deploying a…
Here’s What Businesses Can Learn From a $2 Million Ransomware Attack SEC Settlement
Business leaders and security teams can learn a lot from the recent $2.1 million settlement reached between the Securities and Exchange Commission and R.R. Donnelly & Sons Co. regarding a ransomware assault. The settlement brought RRD’s negligence to light…
Zero-Trust Security: The Critical Role of Trust And Human Integrity
Zero-trust security, a framework built on the principle of “never trust, always verify,” has transformed how organisations protect their data. However, as vital as the technical safeguards in this system are, there’s an often-overlooked aspect: the human element. The…