30-Year-Old Medical Protocol Making Headlines

30-Year-Old Medical Protocol Making Headlines

Researchers from Aplite have identified potential exposure of around 60 million personal and medical records due to…
Will the Real Admin Please Step Up?

Will the Real Admin Please Step Up?

New research from Outpost24 concludes that IT administrators may be as careless as the other employees regarding…
Straightening Out the curl Vulnerability

Straightening Out the curl Vulnerability

In recent days, the cybersecurity community held its collective breath in anticipation of the disclosure of two…
Forever 21 Discloses Data Breach Impacting Over Half a Million

Forever 21 Discloses Data Breach Impacting Over Half a Million

Fashion retailer Forever 21 has revealed a data breach that has affected more than 500,000 individuals. The…
The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

The Enemy Within:  Tesla’s Data Breach Was an “Inside Job”

Tesla has acknowledged in an official filing with the Maine attorney general that the recent data breach,…
Russia Prime Suspect for UK Electoral Commission Cyber Attack

Russia Prime Suspect for UK Electoral Commission Cyber Attack

A cyber attack targeting the UK’s Electoral Commission, which resulted in the exposure of data belonging to…
Storm-0558 Isn’t Over Yet

Storm-0558 Isn’t Over Yet

A report published this week by the independent security firm Wiz has raised serious concerns about the…
Made-In-China Hack Infiltrates the US Government

Made-In-China Hack Infiltrates the US Government

A hacking campaign, which began in mid-May, saw Chinese hackers infiltrating US government email accounts, including those…
EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

EU-U.S. Data Privacy Framework: Is Adequate Good Enough?

The European Union has approved a new agreement regarding the privacy of individuals’ personal information transmitted across…
Anonymous Sudan Or Anonymous Russia?

Anonymous Sudan Or Anonymous Russia?

Anonymous Sudan gained notoriety with its distributed denial of service (DDoS) attacks, targeting Microsoft in June.  Earlier…
Over 100,000 ChatGPT User Account Credentials For Sale on the Dark Web

Over 100,000 ChatGPT User Account Credentials For Sale on the Dark Web

This week, researchers at Group-IB discovered that upwards of 100,000 ChatGPT user accounts were up for sale…
Ransomware Causes St. Margaret Health’s Permanent Closure

Ransomware Causes St. Margaret Health’s Permanent Closure

The recent closure of St. Margaret’s Health, a hospital in Illinois, serves as a powerful reminder of…
MOVEit Transfer Vulnerability Going Wild

MOVEit Transfer Vulnerability Going Wild

The Clop ransomware organization purportedly exploited a critical zero-day flaw in the MOVEit file transfer program. Security…
8Base on a Ransomware Rampage

8Base on a Ransomware Rampage

In just one month, the ransomware group known as 8Base emerged as the second most active ransomware…
FTC Penalizes Amazon with Millions in Fines

FTC Penalizes Amazon with Millions in Fines

Yesterday, the FTC took a significant enforcement step against Amazon claiming that The Children’s Online Privacy and…
Record 1.3 Billion GDPR Penalty Slapped on Meta

Record 1.3 Billion GDPR Penalty Slapped on Meta

Meta, better known for Facebook and Instagram, has been fined a record $1.3 billion (€1.2 billion) for…
Health Sector Warned of Veeam Vulnerability

Health Sector Warned of Veeam Vulnerability

Threat actors are increasingly targeting Veeam Backup & Replication in cyber attacks. Veeam Software’s Veeam Backup &…
Malware Strain Disguised as a Chrome Updater

Malware Strain Disguised as a Chrome Updater

A recently spotted campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information-stealing…
Critical Flaw Found in DNA Sequencers

Critical Flaw Found in DNA Sequencers

A significant vulnerability in Illumina gene sequencing software puts a spotlight on the need to bolster cybersecurity…
The NIST CSF Makeover Scheduled for the Summer

The NIST CSF Makeover Scheduled for the Summer

NIST plans for a significant update to the NIST CSF Framework this summer. They recently published a…
Privacy in the Age of ChatGPT

Privacy in the Age of ChatGPT

One of the main concerns with language models like ChatCPT is privacy risks. The model uses any…
Emergency Update for Apple Devices

Emergency Update for Apple Devices

Apple has released emergency security updates to address two zero-day vulnerabilities that have already been exploited in…
Operation Cookie Monster

Operation Cookie Monster

On Tuesday, more than a dozen law enforcement organizations from around the world shut down the Genesis…
Call for Restraint in the Race to AI

Call for Restraint in the Race to AI

Is the World Adopting AI Models Too Fast? That’s what an elite group of tech leaders and…
Saks Fifth Avenue Added to GoAnywhere Victim List 

Saks Fifth Avenue Added to GoAnywhere Victim List 

Dozens of organizations have been added to Clop ransomware’s victim list over the last couple of months,…
Beware: SVB’s Collapse Being Exploited By Scammers

Beware: SVB’s Collapse Being Exploited By Scammers

Cybersecurity experts caution that scammers are profiting from the turmoil caused by the collapse of Silicon Valley…
New TSA Regulations for Airlines Facing “Persistent Cybersecurity Threats”

New TSA Regulations for Airlines Facing “Persistent Cybersecurity Threats”

The Transportation Security Administration on Tuesday announced regulations to force airports, along with aircraft owners and operators,…
CISA Calls on Tech Developers to Put Security into Digital Products 

CISA Calls on Tech Developers to Put Security into Digital Products 

CISA called on technology development companies to “fundamentally shift” product design to one that puts cybersecurity at…
Social Engineering “Smishing” Attack on Coinbase

Social Engineering “Smishing” Attack on Coinbase

Coinbase and other crypto platforms are frequently targeted by fraudsters. That’s because currency in any form is…
GoAnywhere Impact Setting In

GoAnywhere Impact Setting In

An attack on the GoAnywhere controlled file transfer software that exploited a recently discovered zero-day vulnerability has…
GoodRx Gets a Taste of its Own Medicine

GoodRx Gets a Taste of its Own Medicine

GoodRx has recently come under fire for breaking its privacy promises and the HBNR (Health Breach Notification…
Malicious Apps Abused Microsofts Verification Standard

Malicious Apps Abused Microsofts Verification Standard

In December, a group of threat actors abused the Microsoft “certified publishers” status of the Microsoft Cloud…
Drop in Ransomware Payments Show Victims Becoming Bold 

Drop in Ransomware Payments Show Victims Becoming Bold 

A report conducted by Chainalysis noted a 40% drop in payments made to ransomware extortion groups in…
POC of CWP Flaw Leads to Live Attacks

POC of CWP Flaw Leads to Live Attacks

The popular and free Control Web Panel software has a significant security flaw that has already been…
What Can’t You Do With Chat GPT?

What Can’t You Do With Chat GPT?

Since its release, there has been an explosion of interest in Chat GPT in the media and…
Google Sued Again For Deceptive Location Tracking

Google Sued Again For Deceptive Location Tracking

Google settled two privacy lawsuits last week. The data and information goliath will pay $9.5 million to…
LastPass Attacker Did Reach Password Vaults

LastPass Attacker Did Reach Password Vaults

What does your human logic dictate? Using third-party password managers like LastPass, sometimes thought to be more…
Game Over for Epic

Game Over for Epic

Fortnite developer, Epic Games, was charged a whopping $275,000,000 penalty in settlement fees in violation of federal…
96% of Classroom Apps Share Student’s Personal Data

96% of Classroom Apps Share Student’s Personal Data

Internet Safety Labs, a non-profit organization on a mission to ensure online product safety, released a new…
Will the FBI Block Tik Tok?

Will the FBI Block Tik Tok?

On Friday, Christopher Wray of the FBI raised concerns that Chinese owned Tik Tok “is in the…
Massive Twitter Leak

Massive Twitter Leak

Chad Loder, the founder of cyber security awareness company Habitu8, received evidence last week of a massive…
World Cup Cyber 

World Cup Cyber 

This Sunday marked the commencement of the FIFA World Cup in Qatar, and threat actors will be…
FTX Has Been Hacked

FTX Has Been Hacked

On Friday, crypto exchange FTX recommended users delete FTX apps and avoid using its website, backing up…
Insurance Giant Settles Groundbreaking Lawsuit with Oreo Cookie Brand Mondelez

Insurance Giant Settles Groundbreaking Lawsuit with Oreo Cookie Brand Mondelez

A settlement was reached last week in a $100,000 lawsuit between Zurich, a global insurance giant, and…
White House Convenes Ransomware Summit

White House Convenes Ransomware Summit

A two-day International Counter Ransomware Summit was held this past Monday and Tuesday. Leaders and experts from…
FBI Warns of Iranian Hacking Group Ahead of Elections

FBI Warns of Iranian Hacking Group Ahead of Elections

Misinformation and disinformation are pressing problems that have mingled with traditional cybersecurity to evolve into a form…
Verizon Verifies Data Breach

Verizon Verifies Data Breach

Verizon notified an unknown volume of its prepaid customers that attackers breached Verizon accounts and were able…
Nullmixer Malware Madness

Nullmixer Malware Madness

Using a single Windows executable file, Nullmixer infects devices with 12 different streams of malware, all at…
Uber: MFA Bombing Attack

Uber: MFA Bombing Attack

Love may conquer all, but apparently MFA won’t. That pesky human factor again. Unmanaged risk surrounding the…
Twitter: Don’t Shut Down- Get Better!

Twitter: Don’t Shut Down- Get Better!

“Twitter was and continues to be one of the world’s most influential communications platforms.What happens on Twitter…
Education Hit Hard by Ransomware

Education Hit Hard by Ransomware

IT systems of the second largest school district in the U.S. were hit over the weekend by…
Third-party Services Breached for 2.5 million Loan Application Records!

Third-party Services Breached for 2.5 million Loan Application Records!

Both EdFinancial and the Oklahoma Student Loan Authority (OSLA) use technology services from Nelnet Servicing, including giving…
Credential Stuffing via Residential Proxy is on the Rise!

Credential Stuffing via Residential Proxy is on the Rise!

Last week, the FBI released a PIN (Private Industry Notification) on their Internet Crime Complaint Center (IC3).…
Meraki Firewall False Positive Triggers Microsoft 365 Outage

Meraki Firewall False Positive Triggers Microsoft 365 Outage

Did you experience trouble connecting to Exchange Online, Microsoft Teams, Outlook desktop clients, and OneDrive for Business…
CosmicStrand: Getting Down to the Root of the Problem

CosmicStrand: Getting Down to the Root of the Problem

How do you rid your computer of a rootkit that tunnels its way into the lowest levels…
4 “High Impact” Security Risks for Okta

4 “High Impact” Security Risks for Okta

Researchers at Authomize discovered 4 ‘high impact’ attack paths in Okta’s trusted management solution. Authomize clearly points…
Phishing for Credentials

Phishing for Credentials

A huge web of phishing attacks were performed on over 10,000 organizations! Tricking victims with fake Office…
ToddyCat APT Aims High

ToddyCat APT Aims High

A new Advanced Persistent Threat (APT) actor has been spotted by Kaspersky cybersecurity researchers attempting attacks on…
Interpol Takes Down 2000 Social Engineers

Interpol Takes Down 2000 Social Engineers

Justice prevailed for the victims of worldwide social engineering scams as police from 76 countries worked together…
Keep China Out: Patch Network Devices ASAP

Keep China Out: Patch Network Devices ASAP

The US government, specifically the NSA, FBI and CISA, have issued explicit warnings that hackers working for…
Hijacked Whatsapp Accounts- Protect Yourself!

Hijacked Whatsapp Accounts- Protect Yourself!

Sometimes the simplest scams are the most effective. Hackers managed to hijack victims’ Whatsapp accounts using mobile…
Pwn2Own- Successful Hacks

Pwn2Own- Successful Hacks

The annual Pwn2Own hacking contest, held in Vancouver, brought together security researchers from all over the world…
The Critical F5 BIG-IP Vulnerability

The Critical F5 BIG-IP Vulnerability

A huge and critical vulnerability broke this week making headlines across cyber news sites. Why is this…
Tricked at the Top: US Dept. of Defense

Tricked at the Top: US Dept. of Defense

Quite amazingly, a resident of California conducted a phishing operation and managed to successfully reroute government money…
Coca-Cola Breach: The Real Thing? 

Coca-Cola Breach: The Real Thing? 

The infamous Stormous ransomware gang claims to have breached Coca Cola’s servers, stealing 161 GB of data.…
Dwell-Time Down, Vigilance Up!

Dwell-Time Down, Vigilance Up!

Mandiant, the cybersecurity company to be acquired by Google later this year, have released their Mandiant M-Trends…
Illegal Legal Hacks

Illegal Legal Hacks

Looks like Apple and meta will be undergoing some social engineering awareness training! Hackers posing as various…
You’ve Been Hacked: Roskomnadzor

You’ve Been Hacked: Roskomnadzor

Ukrainian anonymous hacking group, appropriately called Anonymous, announced over Twitter this week that they had breached and…
Skip to content