Category cyber-attacks

Emerging Hacking Group Targeting Russian Firms with Ransomware

Recent months have seen a marked increase in ransomware assaults targeting critical infrastructure, with cybersecurity researchers identifying a new group engaging in sophisticated, multistage attacks aimed primarily at major corporate networks within Russia. This emerging threat actor, dubbed “OldGremlin,” appears to be linked to numerous operations that have been active…

Read MoreEmerging Hacking Group Targeting Russian Firms with Ransomware

AI Toys for Kids Discussing Sex, Drugs, and Chinese Propaganda

Recent reports indicate that two individuals believed to be associated with China’s notorious Salt Typhoon hacking group may have previously undergone training at Cisco’s renowned networking academy. This development comes amidst growing concerns among U.S. lawmakers that expanded wiretap powers are inadequately protecting citizens’ data, allowing intelligence agencies broader access…

Read MoreAI Toys for Kids Discussing Sex, Drugs, and Chinese Propaganda

Researchers Discover Cyber Espionage Campaign Targeting Indian Army

Recent cybersecurity investigations have revealed an ongoing cyberespionage initiative targeting Indian defense agencies and military personnel, dating back to at least 2019. This operation, identified as “Operation SideCopy” by Quick Heal, an Indian cybersecurity firm, is believed to be orchestrated by an advanced persistent threat (APT) group adept in concealing…

Read MoreResearchers Discover Cyber Espionage Campaign Targeting Indian Army

U.S. Accuses Six Russian Intelligence Officers of Conducting Devastating Cyberattacks

On Monday, the US government officially indicted six members of the Russian military intelligence unit, known as Unit 74455 of the GRU, for orchestrating a series of high-impact cyberattacks using destructive malware aimed at destabilizing global systems and inflicting financial damage. The indictment describes these individuals as responsible for a…

Read MoreU.S. Accuses Six Russian Intelligence Officers of Conducting Devastating Cyberattacks

Urgent: Active Attacks Exploit New Chrome Zero-Day – Update Your Browser Immediately

Critical Update Required for Google Chrome Users: Zero-Day Vulnerability Exploited Business owners and professionals using Google Chrome on Windows, Mac, or Linux systems are urged to update their browsers immediately. On October 20, Google rolled out version 86.0.4240.111, addressing multiple high-severity security vulnerabilities, including an urgent zero-day flaw that has…

Read MoreUrgent: Active Attacks Exploit New Chrome Zero-Day – Update Your Browser Immediately

TrickBot Linux Variants Remain Active in the Wild Following Recent Takedown

Recent investigations indicate that despite concerted efforts to disrupt the TrickBot malware operations, its creators are adapting and evolving their tactics. A report from cybersecurity firm Netscout reveals that the authors of TrickBot have ported elements of their malicious code to Linux, broadening their potential target base. Initially identified in…

Read MoreTrickBot Linux Variants Remain Active in the Wild Following Recent Takedown

FBI and DHS Alert: Major Ransomware Threats Targeting Healthcare Systems

On Wednesday, a joint alert was issued by the Federal Bureau of Investigation (FBI), the Departments of Homeland Security, and Health and Human Services (HHS), signaling an urgent escalation in ransomware attacks directed at the healthcare sector. This warning highlights an alarming trend where malicious cyber actors are targeting hospitals…

Read MoreFBI and DHS Alert: Major Ransomware Threats Targeting Healthcare Systems

Doxers Impersonating Law Enforcement Are Deceiving Big Tech into Revealing Users’ Private Information

Incident of Impersonation Data Breach Raises Alarms Over Cybersecurity Risks On September 4, a privacy specialist at Charter Communications responded to an emergency data request from someone impersonating Officer Jason Corse of the Jacksonville Sheriff’s Office. Within minutes, sensitive personal information—including the name, home address, phone numbers, and email address…

Read MoreDoxers Impersonating Law Enforcement Are Deceiving Big Tech into Revealing Users’ Private Information