Small businesses are becoming more concerned about payment fraud, as revealed by a recent survey from regional bank KeyBank. The survey included nearly 2,000 small-to-medium-sized businesses with annual revenues of less than $10 million. The results show that payment…
Category: CySecurity News – Latest Information Security and Hacking Incidents
Cyberattack Cripples Forklift Giant Crown Equipment’s Production
In a recent report to the company’s employees, Ohio-based Crown Equipment, which is one of the world’s largest industrial and forklift truck manufacturers, confirmed that it had been attacked by a cybercriminal organization. After a cyberattack, the company has…
From Siri to 5G: AI’s Impact on Telecommunications
The integration of artificial intelligence (AI) has significantly transformed the landscape of mobile phone networks. From optimizing network performance to enhancing user experiences, AI plays a pivotal role in shaping the future of telecommunications. In this blog post, we delve…
Young Hacker Linked to Scattered Spider Group Detained
Spanish police, aided by the FBI, have made a major breakthrough in combating cybercrime by arresting a 22-year-old man in Palma de Mallorca. The suspect, Tyler Buchanan from Dundee, Scotland, is believed to be a leading figure in the…
EU Proposes New Law to Allow Bulk Scanning of Chat Messages
The European elections have ended, and the European football tournament is in full flow; why not allow bulk searches of people’s private communications, including encrypted ones? Activists around Europe are outraged by the proposed European Union legislation. The EU…
Crafty Criminals Use Fake Error Messages to Deploy Malware via PowerShell
Criminals are targeting thousands of organizations worldwide with social engineering attacks that use fake error messages to trick users into running malicious PowerShell scripts. This new Windows malware campaign uses bogus error messages from Google Chrome, Microsoft Word, and…
Securing Corporate Data: The Crucial Role of Third-Party Access Audits
Organizations’ data and systems can be compromised by seemingly benign entities—third-party contractors, vendors, and outsourced service providers—when those entities are seemingly innocent. External entities that perform these tasks must have access to sensitive data and systems. However, improper management…
Defending Hospitals and Clinics: Strategies Against Ransomware
The healthcare industry has become a prime target for ransomware attacks in recent years. These malicious campaigns exploit vulnerabilities in healthcare systems, disrupt critical services, and compromise sensitive patient data. According to Steve Stone, president of Rubrik’s Zero Labs, ransomware…
Hackers Exploit Snowflake Data, Targeting Major Firms
Hackers who stole terabytes of data from Ticketmaster and other customers of the cloud storage firm Snowflake claim they gained access to some Snowflake accounts by breaching a Belarusian-founded contractor working with those customers. Approximately 165 customer accounts were…
The Growing Threat of Data Breaches to Australian Businesses
Data breaches are now a significant threat to Australian businesses, posing the risk of “irreversible brand damage.” A cybersecurity expert from Fortinet, a global leader in the field, has raised alarms about cybercriminals increasingly targeting the nation’s critical infrastructure.…