Category cyber-attacks

Hackers Target X-Ray and MRI Machines in Healthcare Espionage Attack

Recent investigations have revealed a concerning trend in cybersecurity, particularly involving a hacking group identified as “Orangeworm,” which has been specifically targeting healthcare organizations across multiple continents for corporate espionage. This malicious operation is plaguing advanced imaging systems, notably those utilized in X-Ray and MRI machines, along with patient consent…

Read MoreHackers Target X-Ray and MRI Machines in Healthcare Espionage Attack

Police Take Down World’s Largest ‘DDoS-for-Hire’ Service; Administrators Arrested

In a significant operation targeting international cybercrime, Dutch authorities have dismantled one of the largest DDoS-for-hire platforms globally, which facilitated over 4 million attacks and culminated in multiple arrests of its operators. The initiative, known as “Operation Power Off,” was spearheaded by the UK’s National Crime Agency (NCA) in collaboration…

Read MorePolice Take Down World’s Largest ‘DDoS-for-Hire’ Service; Administrators Arrested

Web Portal Exposes Kids’ Chat with AI Toy to Anyone with a Gmail Account

Vulnerability Discovered in AI-Enabled Children’s Toy Reveals Sensitive Data In a concerning incident this month, security researcher Joseph Thacker uncovered a significant vulnerability in Bondus, a line of stuffed dinosaur toys equipped with artificial intelligence chat functions aimed at children. The toy allows kids to engage in interactive conversations, functioning…

Read MoreWeb Portal Exposes Kids’ Chat with AI Toy to Anyone with a Gmail Account

Flawed Patch for Oracle WebLogic Vulnerability Reopens Servers to Cyber Attacks

Critical Vulnerability Resurfaces in Oracle WebLogic Server Earlier this month, Oracle issued a patch addressing a significant Java deserialization remote code execution vulnerability in its WebLogic Server component, part of the Fusion Middleware suite. This flaw, identified as CVE-2018-2628, poses a severe threat, potentially allowing attackers to gain complete control…

Read MoreFlawed Patch for Oracle WebLogic Vulnerability Reopens Servers to Cyber Attacks

ICE Acts Like a Military Force: Its Tactics Risk Endangering Real Soldiers

Recent developments within U.S. immigration enforcement agencies indicate a troubling shift in tactics that could have significant implications for civil liberties and public safety. Echoing the adage that “war is politics by other means,” state-sponsored violence—specifically actions taken by Immigration and Customs Enforcement (ICE)—has escalated under the guidance of White…

Read MoreICE Acts Like a Military Force: Its Tactics Risk Endangering Real Soldiers

Man Sentenced to 7 Years for Hacking Jail Systems to Secure Friend’s Early Release

A recent case underscores the persistent threat posed by cybersecurity breaches, particularly within government systems. **Konrads Voits**, a young hacker from Ypsilanti, Michigan, has been sentenced to over seven years in prison for attempting to breach the Washtenaw County Jail’s computer system. His objective was to manipulate prison records in…

Read MoreMan Sentenced to 7 Years for Hacking Jail Systems to Secure Friend’s Early Release

County Awards $600,000 Settlement to Penetration Testers Arrested for Courthouse Security Assessment

Security Professionals Settle Lawsuit Following Unauthorized Arrest During Courthouse Assessment Two security experts, arrested in 2019 while conducting a sanctioned security evaluation of a courthouse in Iowa, have agreed to a $600,000 settlement in a lawsuit alleging wrongful arrest and defamation. Gary DeMercurio and Justin Wynn, penetration testers affiliated with…

Read MoreCounty Awards $600,000 Settlement to Penetration Testers Arrested for Courthouse Security Assessment

Hackers Discover New Method to Bypass Microsoft Office 365 Safe Links

Recent findings from security researchers indicate that some hacking groups have discovered a method to circumvent a critical security feature within Microsoft Office 365, aimed at safeguarding users from phishing and malware threats. Known as Safe Links, this feature is bundled with Microsoft’s Advanced Threat Protection (ATP) and operates by…

Read MoreHackers Discover New Method to Bypass Microsoft Office 365 Safe Links