Cyber Security Threats
Stay informed about the ever-evolving landscape of cyber threats. Explore the latest developments in malware, ransomware, and zero-day vulnerabilities, and learn how to protect your digital assets from these risks.
655K Health Files from Unreported Data Breaks Purchasable on Darknet
Throughout the last few weeks, huge data dumps occurred from extraordinary cyberattacks on MySpace, LinkedIn, and Tumblr. More lately, in excess of 33 million mutilated Twitter accounts were registered online for sale. These accounts are … Read more
Hospital Legacy System Security Vulnerabilities Being Exploited to Gain Access to Health Data
Cybercriminals are taking advantage of hospital legacy system security vulnerabilities and are installing malware on medical devices such as blood gas infusers. The malware is used to steal data or launch attacks on other parts … Read more
Flaws Fixed and Widespread Attacks Expected due to DMA Locker Ransomware
After the recent reports that TeslaCrypt has been decommissioned comes a new highly dangerous threat: DMA Locker ransomware. Malwarebytes has recently revealed that DMA Locker ransomware, which is now in its 4th incarnation – could … Read more
Acer Cyberattack: 34,500 Customers Impacted: Credit Card Numbers Stolen
The Acer cyberattack recently reported to the California attorney general was due to an unspecified “security issue” on the company’s online store. Acer recently discovered that an unauthorized third party had gained access to its … Read more
75% of Companies Face High Risk of Cyber Incidents
Organizations can use the NIST Cybersecurity Framework to assess their cybersecurity programs, but many may discover they have not done nearly enough to reduce the risk of cyber incidents. Recent research conducted by RSA suggests … Read more
New Critical Flaws in Windows and Flash Player
This week saw a host of updates issued by Microsoft to address critical flaws in Windows, although 44 security vulnerabilities in total have been addressed in the updates. These vulnerabilities affect a wide range of … Read more
Brazilian Criminals Use Malicious PNG File to Infect Windows, OS X, and Linux Machines
An email spamming campaign has been identified by SecureList which is being used, currently, to attack computers in Brazil. However, while the majority of victims are located in Brazil, the malware is also being used … Read more
Zuckerberg Twitter Hack Shows Danger of Password Reuse
The Zuckerberg Twitter hack has clearly demonstrated the danger of password reuse. Zuckerberg used the same password for Twitter as he did for his Pinterest and LinkedIn accounts. In spite of the Facebook founder, chairman, … Read more
40,000 Podiatry Patients Notified of PHI Revelation
Earlier this year, Stamford Podiatry Group P.C., has found out that an illegal third party accessed to its computer systems for a period of nearly 2 months. The intruder was capable to see company data … Read more
Jetpack Plugin Vulnerability Places a Million WordPress Websites At Risk
Security researchers have discovered a serious Jetpack plugin vulnerability that places sites at risk of attack by hackers. If you run WordPress sites for your company and you use the Jetpack website optimization plugin, you … Read more
MySpace Data Breach: 360 Million Login Credentials Offered for Sale
Over the past few days, rumors have been circulating about a massive MySpace data breach. Initial reports suggested that 427 million usernames and passwords had been obtained by a hacker going by the name of … Read more
Tucson Emergency Chamber Patients’ PHI Thieved from Doctor’s Automobile
Roughly 1K patients in Southern Arizona have received notices of a break of safeguarded health information after the thievery of a doctor’s record. The record had been dumped in the automobile of a doctor who … Read more
HHS Publicizes Release of the Ultimate Data Safety Policy Rules Framework
Sylvia Matthews Burwell, HHS Secretary has publicized the release of the ultimate Data Safety Policy Rules Framework for the Precision Medicine Initiative (PMI) which was introduced by President Obama in the early part of 2015. … Read more
Medical Colleagues of Texas Hacking Case Affects 68,000 Patients
Medical Colleagues of Texas, a doctors’ alliance based in Katy, TX, has discovered that an unauthorized individual gained access to its system, compromising the files of over 68,000 patients. The specific details of the incident … Read more
95000 More Patients Revealed to Have Been Affected by Bizmatics Data Break
The OCR has gotten two more break reports from healthcare suppliers affected by the Bizmatics data break. Nearly 95K patients of the 2 healthcare services have possibly had their files accessed by cyberpunks. Southeast Eye … Read more
DMA Locker Ransomware: Flaws Fixed and Widespread Attacks Expected
After the recent news that TeslaCrypt has been decommissioned comes a new highly serious threat: DMA Locker ransomware. Malwarebytes has recently reported that DMA Locker ransomware, which is now in its 4th incarnation – could … Read more
CEO Fraud Scam Costs Chief Executive His Job (And His Company 40.1 Million Euros)
A successful CEO fraud scam that resulted in a fraudulent bank transfer being made from company accounts to a cyberattacker has cost the CEO his job. CEO Fraud Scan Results in Losses of 40.9 Million … Read more
Hospital Ransomware Infection Not Resolved After Ransom Paid
Resolving a hospital ransomware infection may not be as easy as paying the attackers’ ransom demand, as was shown by the Kansas Heart Hospital ransomware attack last week. Hospital Ransomware Infection Not Removed After Ransom … Read more
Dridex Botnets Being Leveraged to Deliver Cerber Ransomware
The threat from Cerber ransomware has increased substantially after the gang behind the file-encrypting software have leveraged Dridex botnets to deliver a malicious payload that loads the ransomware onto users’ devices. Cerber ransomware was first … Read more
4K Michigan Chiropractic Patients Informed of Possible Data Break
4,082 sick persons of Complete Chiropractic & Bodywork Therapies (CCBT) have been informed of a possible break of safeguarded health information following malware was found in one of the firm’s servers. The malware was found … Read more
2,100 Old-timers Had Their PHI Revealed in April
Every month the Division of Veteran Matters issues a statement to Congress on the info safety cases experienced by Veteran Affairs (VA) services during the month. Protected health information (PHI) disclosures increased substantially in April, … Read more
Healthcare Data Privacy and Security: Ponemon Releases Results of New Benchmark Study
Each year, the Ponemon Institute conducts a benchmark survey on healthcare data privacy and security. The surveys give a picture of the state of healthcare data security, highlight the main threats faced by the healthcare … Read more
FTC to Investigate Security Update Practices of Mobile Device Manufacturers
The Federal Trade Commission (FTC) is conducting a study to investigate the security update practices of mobile device manufacturers. The study is being conducted amid concern that mobile device manufacturers are not doing enough to … Read more
How to Block Exploit Kits and Keep your Network Protected
Last week, the website of a major toy manufacturer was discovered to have been compromised and was being used to infect visitors with ransomware. The website of Maisto was loaded with the Angler exploit kit … Read more
Risk of Phishing Attacks and Ransomware Infections Highlights Need for Web Filtering Software
The risk of phishing attacks has increased considerably over the past 12 months, according to a new data breach report from Verizon. Ransomware attacks are also on the rise. The two are often used together … Read more
World Cup 2018 Phishing Scams
Kaspersky Lab has recently discovered World Cup 2018 phishing scams, with many of the early scams being carried out through emails to bring soccer fans to malicious websites offering the opportunity to purchase tickets for … Read more
Personalized Phishing Scam Uses Names and Addresses to Fool Victims into Installing Malware
Companies have been warned to remain diligent following the identification of a new personalized phishing scam that tries to fool users into downloading malware on their company’s computers. These new personalized phishing campaigns are primarily … Read more
Shadow IT Risk Highlighted By New Malware Discovery: 12 Million Machines Infected
IT professionals are well aware of the shadow IT risk. Considerable risk is introduced by employees installing unauthorized software onto their work computers and mobile devices. However, this has been clearly illustrated this week following … Read more
Patch Issued to Prevent Microsoft Wireless Mouse Hijacking
The risk of Microsoft wireless mouse hijacking has been addressed this week. An optional fix was released as part of the latest KB3152550 Windows update. The update is for Windows 7, 8.1, and 10, although … Read more
Dell SecureWorks Releases Underground Hacker Markets Report
This month Dell SecureWorks released its annual underground hacker markets report. For the past three years, intelligence analysts at Dell SecureWorks have been tracking underground hacking forums and gathering intel. The annual reports provide an … Read more
Symantec’s Internet Security Threat Report Shows Major Increase in Online Threats
Symantec’s 2016 Internet security threat report has revealed the lengths to which cybercriminals are now going to install malware and gain access to sensitive data. The past 12 months has seen a substantial increase in … Read more
Law Firm Data Security Under Scrutiny After Wave of Cyberattacks and Leaks
Law firm data security has come under the spotlight in the past couple of weeks following the publication of a number of news reports on hacking incidents at law firms, and most recently, the huge … Read more
FBI Seeks Help To Deal With Enterprise Ransomware Threat
In February, the Federal Bureau of Investigation (FBI) issued an alert over a new ransomware called MSIL (AKA Samas/Samsam/Samsa), but a recent confidential advisory was obtained by Reuters, in which the FBI asked U.S. businesses … Read more
1,400 Weaknesses Discovered in Admired Drug Cabinet System
As per an advisory released by the Division of Homeland Security, an admired drug cabinet system has been discovered to have more than 1,400 weaknesses, a lot of which might be abused distantly using freely available activities. … Read more
It’s World Backup Day – Could You Recover From a Data Disaster?
Today is World Backup Day – a day when awareness of the need to backup data is raised around the world. It is a day when companies that are not backing up their critical data … Read more
AceDeceiver iPhone Malware Attacks Non-Jailbroken Phones
AceDeceiver iPhone malware can attack any iPhone, not just those that have been jailbroken. The new iOS malware has recently been identified by Palo Alto Networks, and a warning has been issued that the new … Read more
New Data-Stealing USB-Based Malware Discovered
A new USB-based malware has recently been discovered that poses a serious security risk to enterprises. While USB-based malware is not new, the discovery of Win32/PSW.Stealer.NAI – also known as USB Thief – has caused … Read more
Microsoft Makes it Easier to Block Malicious Word Macros in Office 2016
System administrators that do not block malicious Word macros in Office 2016 could be making it far too easy for hackers to compromise their networks. Malicious Word macros are nothing new, but in recent months … Read more
Symantec: Spam Levels at 12 Year Low
Recent reports from Cyber security giant Symantec indicates that email spam levels are now at the lowest point seen in the past 12 years. According to the report spam emails dropped to 49.7% of all … Read more
Fileless Malware is Being Installed Using Microsoft Word Macros
Palo Alto Networks has discovered a new spam email campaign that is being used to spread fileless malware via malicious Microsoft Word macros sent as email attachments. What is Fileless Malware? Fileless malware, or memory-resident … Read more
United States Ransomware Attacks Conducted by Chinese Hacking Groups?
Security firms are reporting that some of the United States ransomware attacks conducted over the past few months have demonstrated a level of sophistication that suggest they are the work of hacking groups previously backed … Read more
Oman TLD Being Exploited By Typosquatters Pushing Genieo Adware
Websites are being registered on Oman’s top level domain by typosqautters looking to capitalize on mistakes made by Mac users and push Genieo adware. The .om domain is intended to catch out Mac users who … Read more
Spanish Sweepstake Lottery Spam Emails
In recent weeks we have been sent reports of emails and letters being shared telling the recipients they have almost become a Euro millionaire as their numbers have been drawn and a prize of €915,810 … Read more
Zika Virus Email Scam Deployed to Share Malware
Recently a healthcare group had its electronic health record system encrypted by ransomware; now a Zika virus email scam has been found, showing the depths that some hackers and cybercriminals will use to in order … Read more
Business Email Compromise Scams Used to Steal Employee Data
Phishing scams have increased significantly in the past few weeks as cybercriminals step up their campaigns during tax season, with many using a technique referred to as business email compromise to fool victims into sending … Read more
Wireless Device Security Vulnerabilities Are Not Being Addressed
According to a recent report issued by Pwnie Labs, wireless device security vulnerabilities are not being addressed by enterprises even though many wireless devices can be used as backdoors into corporate networks. If wireless printers … Read more
Malware being Sent via Zika Virus Email Scam
Recently a healthcare supplier had its electronic health record system locked by ransomware; now a Zika virus email malware campaign has been discovered, revealing the depths that some hackers and cybercriminals will go to so … Read more
Opt for Cloud-Based Web Filtering Appliances for Schools instead of Hardware-Based
Hardware-based web filtering appliances for schools have some benefits, but many K12 schools are saying goodbye to the appliances and are opting for a much more convenient and practical solution. In the United States, K12 … Read more
Malware Shared Via Zika Virus Email Scam Used to Deliver
A Zika virus email scam has been uncovered following a healthcare supplier having its electronic health record system locked using ransomware. This email scam tries to prosper thank to the public interest in the Zika … Read more
Lloyds Bank Phishing Campaign Identified
A Lloyds Bank phishing scam has been uncovered that involved the UK bank’s customers being targeted before the Christmas period. The emails sent were very realistic email, appearing as though sent from Lloyds Banking Group. … Read more