Category cyber-attacks

TSMC Halts Production Following Computer Virus Attack Affecting iPhone Chip Supply

Taiwan Semiconductor Manufacturing Company Faces Disruption Due to Virus Attack Taiwan Semiconductor Manufacturing Company (TSMC), a critical player in the semiconductor industry and the exclusive supplier of system-on-chip (SoC) components for Apple’s iPhones and iPads, experienced a significant operational setback following a computer virus outbreak. The incident, which occurred late…

Read MoreTSMC Halts Production Following Computer Virus Attack Affecting iPhone Chip Supply

TSMC Attributes Production Shutdown to WannaCry Malware Attack

Taiwan Semiconductor Manufacturer Faces Shutdown Due to Malware Outbreak Taiwan Semiconductor Manufacturing Company (TSMC), the global leader in semiconductor and processor production, was compelled to halt operations at several fabrication facilities following the infiltration of a computer virus. The incident unfolded over the weekend, raising significant concerns about the company’s…

Read MoreTSMC Attributes Production Shutdown to WannaCry Malware Attack

Researchers Create Stealthy Malware Enhanced by Artificial Intelligence

Artificial Intelligence (AI) has emerged as a double-edged sword in cybersecurity. While it presents a promising avenue for identifying and mitigating malware threats before they can impact organizations, it can also be exploited by cyber adversaries to develop a new class of malware that can bypass state-of-the-art defenses. Such sophisticated…

Read MoreResearchers Create Stealthy Malware Enhanced by Artificial Intelligence

Cybercriminals Can Breach Your Network Simply by Sending a Fax

Recent research has unveiled alarming vulnerabilities concerning fax machines that could be exploited by remote attackers using nothing more than a fax number. Check Point researchers have pinpointed two critical remote code execution (RCE) vulnerabilities embedded within the communication protocols of millions of fax machines worldwide. Contrary to the perception…

Read MoreCybercriminals Can Breach Your Network Simply by Sending a Fax

Mastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Researchers at the Acronis Threat Research Unit (TRU) have uncovered a troubling trend where hackers are exploiting current news headlines to target U.S. government entities. Eschewing complex exploits, these cybercriminals utilize a more straightforward method: leveraging public curiosity about current events. In a report by Ilia Dafchev and Subhajeet Singha,…

Read MoreMastang Panda Exploits Venezuela News to Distribute LOTUSLITE Malware

Ex-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

A former Microsoft network engineer, Raymond Odigie Uadiale, recently received an 18-month prison sentence for his role in a money laundering operation tied to the Reveton ransomware. Uadiale had pleaded guilty earlier this year, highlighting the ongoing issue of cybersecurity threats and the criminal exploitation of digital platforms. Reveton, a…

Read MoreEx-Microsoft Engineer Sentenced to Prison for Involvement in Reveton Ransomware Scheme

Email Phishers Find New Method to Evade Microsoft Office 365 Security Protections

Recent warnings from cybersecurity researchers have highlighted an emerging phishing attack targeting users of Microsoft Office 365, a comprehensive suite of online services including Exchange, SharePoint, and various Office applications. This sophisticated attack has been designed to subvert the Advanced Threat Protection (ATP) measures employed by major email services to…

Read MoreEmail Phishers Find New Method to Evade Microsoft Office 365 Security Protections

16-Year-Old Hacktivist Breaches Apple Servers and Pilfers 90GB of Confidential Data

Apple Security Breach Exposed by Teenage Hacker In a surprising turn of events, Apple, a company long regarded as a bastion of cybersecurity, fell victim to a breach orchestrated by a 16-year-old high school student. This incident has raised significant concerns within the tech community, especially among business owners wary…

Read More16-Year-Old Hacktivist Breaches Apple Servers and Pilfers 90GB of Confidential Data