Technology company Comparitech reported a study that assessed 186 ransomware attacks against U.S. businesses in 2020. The study concluded that companies lost US$21 billion because of the downtime caused by the attack. The number of ransomware attacks increased by 245%…
Latest posts - Page 79
Windows vulnerabilities patched by Microsoft security patches
Microsoft rolled out security patches for vulnerabilities in windows. The patch addressed one of the critical vulnerabilities: the vulnerability was widely targeted by attackers who could use it for remorse code execution for gaining control over vulnerable systems. Out of…
Ransomware attacks based on Python: the quickest attacks
Python-based ransomware was used for carrying out successful cyberattacks in record time-less than 3 hours. Sophos cited the attack as one of the fastest ransomware attacks launched against victims. The python based ransomware was planted in the system 10 minutes…
Threat actors targeting middle east telecommunications & aerospace
Operation Ghost Cell, a cyberespionage campaign, targets aerospace and telecommunications industries in the Middle East and causes collateral damage in the U.S, Russia and Europe. The threat actors intended to obtain critical data about the organization’s infrastructure and technology. Investigators…
Proxy Phantom: Fraud rings flood online merchants
A massive fraud operation slamming e-commerce merchants in account takeover attacks has been revealed by researchers. Sift, a fraud protection business announced on Thursday that the ring, called Proxy Phantom, is employing over 1.5 million stolen account credentials in automated…
Healthcare organizations hit by Ransomware attacks
Ponemon Institute polled 597 IT and IT security professionals to learn how COVID-19 has influenced how healthcare delivery organizations (HDOs) defend patient care and patient data from increasingly virulent assaults, particularly ransomware. This study demonstrates for the first time that…
Apple AirTag Bug Enabled ‘Good Samaritan’
If the AirTag has been set to lost mode, the new $30 AirTag tracking device from Apple has a feature that lets anyone who finds one of these tiny location beacons scan it with a mobile phone and know its…
Akamai acquires cybersecurity firm
Akamai Technologies has purchased Guardicore to expand its cybersecurity portfolio for content delivery networks (CDNs). The agreement was made public on Wednesday. Akamai will pay about $600 million to purchase all outstanding shares under the terms of the transaction. Based…
Atlassian Confluence RCE Flaw Abused
Opportunistic threat actors were discovered actively exploiting a previously published severe security weakness in Atlassian Confluence deployments on Windows and Linux to deploy web shells that resulted in the execution of crypto miners on vulnerable systems. The vulnerability, tracked as…
Data from Oath Keepers leaked online
A hacker claims to have obtained and leaked massive amounts of data from the Oath Keepers, a far-right militia group whose members were present at the Capitol incident on January 6. The hacker furnished the journalism and transparency collective Distributed…