Wondering what to do in the aftermath of a fraud can be extremely difficult. The Better Business Bureau’s (BBB) new fraud Survival Toolkit helps fraud survivors navigate the recovery process. Fraudsters target people from many walks of life. BBB…
Category: CySecurity News – Latest Information Security and Hacking Incidents
YouTube Emerging as a Hotspot for Cyber Threats: Avast Report
YouTube has become a new battleground for cybercriminals to launch phishing attacks, spread malware, and promote fraudulent investment schemes, according to a recent report by Avast, a leading security vendor. Avast’s researchers highlighted the use of tools like Lumma…
EPA Report Reveals Cybersecurity Risks in U.S. Water Systems
A recent report from the Environmental Protection Agency (EPA) revealed that over 70% of surveyed water systems have failed to meet key cybersecurity standards, making them vulnerable to cyberattacks that could disrupt wastewater and water sanitation services across the…
LockBit Ransomware Gang Claims Responsibility for London Drugs Cyberattack
In a recent turn of events, the LockBit ransomware gang has claimed responsibility for the cyberattack on Canadian pharmacy chain London Drugs, which occurred in April. The cybercriminals are now threatening to release sensitive data online after reportedly unsuccessful negotiations…
Cryptojacking Alert: GhostEngine Disables Endpoint Protections
Recently found malware uses advanced techniques to defeat antivirus safeguards, delete signs of infection, and permanently infect devices with cryptocurrency-mining software, experts said. “The first goal of the GhostEngine malware is to disable endpoint security solutions and specific Windows event…
Sharenting: What parents should consider before posting their children’s photos online
21st century parenting is firmly grounded in technology. From iPads keeping kids entertained on flights, to apps that allow parents to track their children’s feeds, development, and more, technology has changed what it means to be a parent. But…
Defending Digital Frontiers: Strategies for Organizations in an Unstable World
An overview Geopolitical Tensions: Regional stability issues, such as political conflicts and economic tensions, have a direct impact on cyber threats. As geopolitical events unfold, threat actors adapt their strategies to exploit vulnerabilities. Attack Trends: While no groundbreaking attack methods…
Breach Forums Plans Dark Web Return Despite FBI Crackdown
Breach Forums, the infamous cybercrime and hacker forum, is all set to return to the dark web under a new Onion label, Hackread reported. While the exact timing for the resuscitation of its clearnet domain is unknown, officials are…
Major Security Flaw Discovered in Popular Cloud Logging Tool
Researchers at Tenable have identified a severe memory corruption vulnerability in Fluent Bit, an open-source logging utility integral to major cloud services. With over 3 billion downloads as of 2022 and an additional 10 million deployments daily, Fluent Bit…
Legacy Windows OSes Fall Prey to Rapid Online Attacks
In 2014, Windows XP was officially retired, marking the end of a decade that has seen it occupy our desktops for more than a decade. The beloved OS was given one last security update in 2019, but for all…