ToddyCat, an advanced persistent threat (APT) gang that targets the government and defence industries, has been seen collecting stolen data “on an industrial scale” from victim organisations in Asia-Pacific. Kaspersky researchers first disclosed details regarding the elusive gang’s actions…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Discord Users’ Privacy at Risk as Billions of Messages Sold Online
In a concerning breach of privacy, an internet-scraping company, Spy.pet, has been exposed for selling private data from millions of Discord users on a clear web website. The company has been gathering data from Discord since November 2023, with…
Cyberattack Fallout: UnitedHealth Reveals Personal Data Breach Impact
As part of its ongoing data breach response, UnitedHealth Group has informed its subsidiaries, Change Healthcare, that they have recently experienced a data breach. Following the February cyberattack on its subsidiary Change Healthcare, UnitedHealth Group revealed on Monday that…
Unveiling Vulnerabilities in Microsoft PlayReady DRM: Impact on Streaming Platforms
In a meticulous research endeavor, Security Explorations, a division of AG Security Research, embarked on an exhaustive analysis of Microsoft’s Warbird and Protected Media Path (PMP) technologies. The culmination of this investigation has unearthed critical deficiencies within the security…
HelloKitty Ransomware Renames to ‘HelloGookie,’ Unveils CD Projekt and Cisco Data
The operator behind the HelloKitty ransomware has rebranded it as ‘HelloGookie,’ with passwords for previously leaked CD Projekt source code, Cisco network data, and decryption keys from earlier attacks being released. Identified as ‘Gookee/kapuchin0,’ the threat actor claims to…
Here’s How to Remove Unnecessary Files from Your Android Phone’s Web Browser
The web browser on your Android phone collects a significant amount of data from the websites you visit, much of which is unnecessary to keep on your device. Regardless of whether you use Google Chrome, Mozilla Firefox, or Samsung…
Where Hackers Find Your Weak Spots: A Closer Look
Social engineering is one of the most common attack vectors used by cyber criminals to enter companies. These manipulative attacks often occur in four stages: Info stealing from targets Building relationships with target and earning trust Exploitation: Convincing the target…
Malware Author Lures Child Abusers Into Honeytrap to Extort Them
You rarely root for online criminals, but a new malware campaign targeting child exploiters does not make you feel awful about the victims. Since 2012, threat actors have developed a range of malware and ransomware that impersonate government agencies…
Stock Market Scam in Bengaluru: Businessman Loses Rs 5.2 Crore
In a recent cybercrime incident, a 52-year-old businessman from Bengaluru fell victim to a stock market scam, losing a staggering Rs 5.2 crore. The victim, referred to as Sharath for anonymity, reported the incident to the cybercrime police on April…
Dark Web Nightmare: Scots NHS Patient Data Breach Exposes Medical Files
Following a major data breach at NHS Dumfries and Galloway, patients can access their private medical records online with just a few clicks. It has been reported that an extremely large amount of data has been stolen from the…