The ransomware attack that caused last week’s cyberattack and outage of online services has been confirmed by health insurance company Medibank. One of Australia’s major private health insurance companies, Medibank Private Limited insures more than 3.7 million individuals and employs…
Latest posts - Page 29
A brand-new PHP malware programme targets Facebook accounts.
An unheard-of Windows information-stealing malware written in PHP that is used to steal Facebook accounts, and browser data. And cryptocurrency wallets is being disseminated through a new Ducktail phishing campaign. Researchers from WithSecure first identified ducktail phishing operations in mid…
Targeting openly accessible Remote Desktop services, Venus Ransomware
Threat actors encrypt Windows PCs by breaking into publicly available Remote Desktop services using the relatively new Venus Ransomware. Venus Ransomware has since encrypted victims all across the world and looks to have started operating in the middle of August…
155 decryption keys are taken from the DeadBolt ransomware by the police.
The DeadBolt ransomware gang was fooled into turning over 155 decryption keys by the Dutch National Police and cybersecurity company Responders.NU. Since its launch in January, the ransomware operation known as DeadBolt has been known to encrypt thousands of QNAP…
Organizations in Poland and Ukraine are affected by the new “Prestige” malware.
The Microsoft Threat Intelligence Center (MSTIC) has found evidence of a fresh ransomware campaign using a hitherto unnamed ransomware payload that targets businesses in the logistics and transportation sectors in Poland and Ukraine. On October 11, we saw the introduction…
The IT infrastructure was impacted by the Tata Power cyberattack, and the bill payment interface was down for a week.
R.K. Singh, the Union Power Minister, stated last month that the Electricity Amendment Bill’s provisions for frequent inspections. And prompt action will soon make India’s power network more future-proof and resistant to cyberattacks. On Friday, Tata Power reported that a…
The NPM Registry API may be subject to a new timing attack that exposes private packages.
Developers may be exposed to supply chain risks as a result of novel timing attacks uncovered against the registry API of the npm package manager. Threat actors can identify businesses’ scoped private packages by compiling a list of potential package…
Israeli Targets Are Attacked By Hackers with Iranian Ties
Commercial Cloud Storage Accounts are Used by Polonium for Command-and-Control Israeli groups are being targeted by an Iranian-affiliated advanced persistent threat cell operating out of Lebanon. The APT group known as Polonium targets businesses in a variety of industries. They…
The leak of Celsius Exchange data is a gift to thieves and digital sleuths alike.
The corporation exposed a significant violation in its consumers’ financial privacy by disclosing half a million users’ transactions in a bankruptcy court file. The paradoxical aspect of bitcoin privacy is that the blockchain, is the permanent record of all transactions…
An unauthorized WhatsApp Android app was discovered taking user accounts.
YoWhatsApp, an unauthorized WhatsApp Android app, has a new version that has been discovered to steal account access keys from users. YoWhatsApp is a fully functional chat app that uses the same permissions as the default WhatsApp app. And is…