Cyber Security Threats

Stay informed about the ever-evolving landscape of cyber threats. Explore the latest developments in malware, ransomware, and zero-day vulnerabilities, and learn how to protect your digital assets from these risks.

655K Health Files from Unreported Data Breaks Purchasable on Darknet

Throughout the last few weeks, huge data dumps occurred from extraordinary cyberattacks on MySpace, LinkedIn, and Tumblr. More lately, in excess of 33 million mutilated Twitter accounts were registered online for sale. These accounts are … Read more

Hospital Legacy System Security Vulnerabilities Being Exploited to Gain Access to Health Data

Cybercriminals are taking advantage of hospital legacy system security vulnerabilities and are installing malware on medical devices such as blood gas infusers. The malware is used to steal data or launch attacks on other parts … Read more

Flaws Fixed and Widespread Attacks Expected due to DMA Locker Ransomware

After the recent reports that TeslaCrypt has been decommissioned comes a new highly dangerous threat: DMA Locker ransomware. Malwarebytes has recently revealed that DMA Locker ransomware, which is now in its 4th incarnation – could … Read more

Acer Cyberattack: 34,500 Customers Impacted: Credit Card Numbers Stolen

The Acer cyberattack recently reported to the California attorney general was due to an unspecified “security issue” on the company’s online store. Acer recently discovered that an unauthorized third party had gained access to its … Read more

75% of Companies Face High Risk of Cyber Incidents

Organizations can use the NIST Cybersecurity Framework to assess their cybersecurity programs, but many may discover they have not done nearly enough to reduce the risk of cyber incidents. Recent research conducted by RSA suggests … Read more

New Critical Flaws in Windows and Flash Player

This week saw a host of updates issued by Microsoft to address critical flaws in Windows, although 44 security vulnerabilities in total have been addressed in the updates. These vulnerabilities affect a wide range of … Read more

Brazilian Criminals Use Malicious PNG File to Infect Windows, OS X, and Linux Machines

An email spamming campaign has been identified by SecureList which is being used, currently, to attack computers in Brazil. However, while the majority of victims are located in Brazil, the malware is also being used … Read more

Zuckerberg Twitter Hack Shows Danger of Password Reuse

The Zuckerberg Twitter hack has clearly demonstrated the danger of password reuse. Zuckerberg used the same password for Twitter as he did for his Pinterest and LinkedIn accounts. In spite of the Facebook founder, chairman, … Read more

40,000 Podiatry Patients Notified of PHI Revelation

Earlier this year, Stamford Podiatry Group P.C., has found out that an illegal third party accessed to its computer systems for a period of nearly 2 months. The intruder was capable to see company data … Read more

Jetpack Plugin Vulnerability Places a Million WordPress Websites At Risk

Security researchers have discovered a serious Jetpack plugin vulnerability that places sites at risk of attack by hackers. If you run WordPress sites for your company and you use the Jetpack website optimization plugin, you … Read more

MySpace Data Breach: 360 Million Login Credentials Offered for Sale

Over the past few days, rumors have been circulating about a massive MySpace data breach. Initial reports suggested that 427 million usernames and passwords had been obtained by a hacker going by the name of … Read more

Tucson Emergency Chamber Patients’ PHI Thieved from Doctor’s Automobile

Roughly 1K patients in Southern Arizona have received notices of a break of safeguarded health information after the thievery of a doctor’s record. The record had been dumped in the automobile of a doctor who … Read more

HHS Publicizes Release of the Ultimate Data Safety Policy Rules Framework

Sylvia Matthews Burwell, HHS Secretary has publicized the release of the ultimate Data Safety Policy Rules Framework for the Precision Medicine Initiative (PMI) which was introduced by President Obama in the early part of 2015. … Read more

Medical Colleagues of Texas Hacking Case Affects 68,000 Patients

Medical Colleagues of Texas, a doctors’ alliance based in Katy, TX, has discovered that an unauthorized individual gained access to its system, compromising the files of over 68,000 patients. The specific details of the incident … Read more

95000 More Patients Revealed to Have Been Affected by Bizmatics Data Break

The OCR has gotten two more break reports from healthcare suppliers affected by the Bizmatics data break. Nearly 95K patients of the 2 healthcare services have possibly had their files accessed by cyberpunks. Southeast Eye … Read more

DMA Locker Ransomware: Flaws Fixed and Widespread Attacks Expected

After the recent news that TeslaCrypt has been decommissioned comes a new highly serious threat: DMA Locker ransomware. Malwarebytes has recently reported that DMA Locker ransomware, which is now in its 4th incarnation – could … Read more

CEO Fraud Scam Costs Chief Executive His Job (And His Company 40.1 Million Euros)

A successful CEO fraud scam that resulted in a fraudulent bank transfer being made from company accounts to a cyberattacker has cost the CEO his job. CEO Fraud Scan Results in Losses of 40.9 Million … Read more

Hospital Ransomware Infection Not Resolved After Ransom Paid

Resolving a hospital ransomware infection may not be as easy as paying the attackers’ ransom demand, as was shown by the Kansas Heart Hospital ransomware attack last week. Hospital Ransomware Infection Not Removed After Ransom … Read more

Dridex Botnets Being Leveraged to Deliver Cerber Ransomware

The threat from Cerber ransomware has increased substantially after the gang behind the file-encrypting software have leveraged Dridex botnets to deliver a malicious payload that loads the ransomware onto users’ devices. Cerber ransomware was first … Read more

4K Michigan Chiropractic Patients Informed of Possible Data Break

4,082 sick persons of Complete Chiropractic & Bodywork Therapies (CCBT) have been informed of a possible break of safeguarded health information following malware was found in one of the firm’s servers. The malware was found … Read more

2,100 Old-timers Had Their PHI Revealed in April

Every month the Division of Veteran Matters issues a statement to Congress on the info safety cases experienced by Veteran Affairs (VA) services during the month. Protected health information (PHI) disclosures increased substantially in April, … Read more

Healthcare Data Privacy and Security: Ponemon Releases Results of New Benchmark Study

Each year, the Ponemon Institute conducts a benchmark survey on healthcare data privacy and security. The surveys give a picture of the state of healthcare data security, highlight the main threats faced by the healthcare … Read more

FTC to Investigate Security Update Practices of Mobile Device Manufacturers

The Federal Trade Commission (FTC) is conducting a study to investigate the security update practices of mobile device manufacturers. The study is being conducted amid concern that mobile device manufacturers are not doing enough to … Read more

How to Block Exploit Kits and Keep your Network Protected

Last week, the website of a major toy manufacturer was discovered to have been compromised and was being used to infect visitors with ransomware. The website of Maisto was loaded with the Angler exploit kit … Read more

Risk of Phishing Attacks and Ransomware Infections Highlights Need for Web Filtering Software

The risk of phishing attacks has increased considerably over the past 12 months, according to a new data breach report from Verizon. Ransomware attacks are also on the rise. The two are often used together … Read more

World Cup 2018 Phishing Scams

Kaspersky Lab has recently discovered World Cup 2018 phishing scams, with many of the early scams being carried out through emails to bring soccer fans to malicious websites offering the opportunity to purchase tickets for … Read more

Personalized Phishing Scam Uses Names and Addresses to Fool Victims into Installing Malware

Companies have been warned to remain diligent following the identification of a new personalized phishing scam that tries to fool users into downloading malware on their company’s computers. These new personalized phishing campaigns are primarily … Read more

Shadow IT Risk Highlighted By New Malware Discovery: 12 Million Machines Infected

IT professionals are well aware of the shadow IT risk. Considerable risk is introduced by employees installing unauthorized software onto their work computers and mobile devices. However, this has been clearly illustrated this week following … Read more

Patch Issued to Prevent Microsoft Wireless Mouse Hijacking

The risk of Microsoft wireless mouse hijacking has been addressed this week. An optional fix was released as part of the latest KB3152550 Windows update. The update is for Windows 7, 8.1, and 10, although … Read more

Dell SecureWorks Releases Underground Hacker Markets Report

This month Dell SecureWorks released its annual underground hacker markets report. For the past three years, intelligence analysts at Dell SecureWorks have been tracking underground hacking forums and gathering intel. The annual reports provide an … Read more

Symantec’s Internet Security Threat Report Shows Major Increase in Online Threats

Symantec’s 2016 Internet security threat report has revealed the lengths to which cybercriminals are now going to install malware and gain access to sensitive data. The past 12 months has seen a substantial increase in … Read more

Law Firm Data Security Under Scrutiny After Wave of Cyberattacks and Leaks

Law firm data security has come under the spotlight in the past couple of weeks following the publication of a number of news reports on hacking incidents at law firms, and most recently, the huge … Read more

FBI Seeks Help To Deal With Enterprise Ransomware Threat

In February, the Federal Bureau of Investigation (FBI) issued an alert over a new ransomware called MSIL (AKA Samas/Samsam/Samsa), but a recent confidential advisory was obtained by Reuters, in which the FBI asked U.S. businesses … Read more

1,400 Weaknesses Discovered in Admired Drug Cabinet System

As per an advisory released by the Division of Homeland Security, an admired drug cabinet system has been discovered to have more than 1,400 weaknesses, a lot of which might be abused distantly using freely available activities. … Read more

It’s World Backup Day – Could You Recover From a Data Disaster?

Today is World Backup Day – a day when awareness of the need to backup data is raised around the world. It is a day when companies that are not backing up their critical data … Read more

AceDeceiver iPhone Malware Attacks Non-Jailbroken Phones

AceDeceiver iPhone malware can attack any iPhone, not just those that have been jailbroken. The new iOS malware has recently been identified by Palo Alto Networks, and a warning has been issued that the new … Read more

New Data-Stealing USB-Based Malware Discovered

A new USB-based malware has recently been discovered that poses a serious security risk to enterprises. While USB-based malware is not new, the discovery of Win32/PSW.Stealer.NAI – also known as USB Thief – has caused … Read more

Microsoft Makes it Easier to Block Malicious Word Macros in Office 2016

System administrators that do not block malicious Word macros in Office 2016 could be making it far too easy for hackers to compromise their networks. Malicious Word macros are nothing new, but in recent months … Read more

Symantec: Spam Levels at 12 Year Low

Recent reports from Cyber security giant Symantec indicates that email spam levels are now at the lowest point seen in the past 12 years. According to the report spam emails dropped to 49.7% of all … Read more

Fileless Malware is Being Installed Using Microsoft Word Macros

Palo Alto Networks has discovered a new spam email campaign that is being used to spread fileless malware via malicious Microsoft Word macros sent as email attachments. What is Fileless Malware? Fileless malware, or memory-resident … Read more

United States Ransomware Attacks Conducted by Chinese Hacking Groups?

Security firms are reporting that some of the United States ransomware attacks conducted over the past few months have demonstrated a level of sophistication that suggest they are the work of hacking groups previously backed … Read more

Oman TLD Being Exploited By Typosquatters Pushing Genieo Adware

Websites are being registered on Oman’s top level domain by typosqautters looking to capitalize on mistakes made by Mac users and push Genieo adware. The .om domain is intended to catch out Mac users who … Read more

Spanish Sweepstake Lottery Spam Emails

In recent weeks we have been sent reports of emails and letters being shared telling the recipients they have almost become a Euro millionaire as their numbers have been drawn and a prize of €915,810 … Read more

Zika Virus Email Scam Deployed to Share Malware

Recently a healthcare group had its electronic health record system encrypted by ransomware; now a Zika virus email scam has been found, showing the depths that some hackers and cybercriminals will use to in order … Read more

Business Email Compromise Scams Used to Steal Employee Data

Phishing scams have increased significantly in the past few weeks as cybercriminals step up their campaigns during tax season, with many using a technique referred to as business email compromise to fool victims into sending … Read more

Wireless Device Security Vulnerabilities Are Not Being Addressed

According to a recent report issued by Pwnie Labs, wireless device security vulnerabilities are not being addressed by enterprises even though many wireless devices can be used as backdoors into corporate networks. If wireless printers … Read more

Malware being Sent via Zika Virus Email Scam

Recently a healthcare supplier had its electronic health record system locked by ransomware; now a Zika virus email malware campaign has been discovered, revealing the depths that some hackers and cybercriminals will go to so … Read more

Opt for Cloud-Based Web Filtering Appliances for Schools instead of Hardware-Based

Hardware-based web filtering appliances for schools have some benefits, but many K12 schools are saying goodbye to the appliances and are opting for a much more convenient and practical solution. In the United States, K12 … Read more

Malware Shared Via Zika Virus Email Scam Used to Deliver

A Zika virus email scam has been uncovered following a healthcare supplier having its electronic health record system locked using ransomware. This email scam tries to prosper thank to the public interest in the Zika … Read more

Lloyds Bank Phishing Campaign Identified

A Lloyds Bank phishing scam has been uncovered that involved the UK bank’s customers being targeted before the Christmas period. The emails sent were very realistic email, appearing as though sent from Lloyds Banking Group. … Read more