Tag cybersecurity

Sensitive Information Found Exposed in United Nations Database Online

A significant cybersecurity incident has come to light involving the United Nations Trust Fund to End Violence Against Women, which inadvertently exposed a database containing sensitive information. This unsecured database, readily accessible on the internet, housed more than 115,000 files related to organizations affiliated with or receiving funding from UN…

Read MoreSensitive Information Found Exposed in United Nations Database Online

CT Reaches Settlement with Machine Learning Firm in Webster Bank Data Breach Case

Connecticut has reached a settlement with Guardian Analytics, a financial crime risk management firm, following a significant data breach that affected one of its clients, Webster Bank. The breach, which occurred between November 2022 and January 2023, compromised the personal information of over 157,000 residents in Connecticut. This sensitive data…

Read MoreCT Reaches Settlement with Machine Learning Firm in Webster Bank Data Breach Case

AnyDesk Breach: Mandatory Password Reset for Users of Popular Remote Desktop Software

AnyDesk, a prominent developer of remote desktop software, has publicly acknowledged a cyber incident that resulted in the compromise of its production systems. The attack was identified during a routine security audit, and the company clarified that it does not involve ransomware. Based in Germany, AnyDesk has alerted the appropriate…

Read MoreAnyDesk Breach: Mandatory Password Reset for Users of Popular Remote Desktop Software

Safeguard Your Fleet Against Cyber Threats: 10 Essential Steps

Cyberattacks disrupting various businesses have become increasingly prevalent in today’s digital landscape, notably impacting fleet operations. These cyber threats compromise not just vehicle functionality and cargo but also safety, data integrity, and ultimately, the financial health of the organization. Acknowledging these challenges is the fundamental first step toward enhancing cybersecurity…

Read MoreSafeguard Your Fleet Against Cyber Threats: 10 Essential Steps

Patchwork Utilizes Romance Scam Tactics to Deploy VajraSpy Malware on Android Devices

Malware Alert: Romance Scams Target Android Users in South Asia A sophisticated cyber threat, linked to the threat actor known as Patchwork, has emerged, predominantly targeting victims in Pakistan and India through deceptive romance scams. This illicit scheme has reportedly utilized a remote access trojan (RAT) named VajraSpy, specifically designed…

Read MorePatchwork Utilizes Romance Scam Tactics to Deploy VajraSpy Malware on Android Devices

Following FBI Crackdown, KV-Botnet Operators Revise Strategies to Regain Ground

The threat posed by the KV-botnet continues to evolve as operators adapt their tactics in response to increased law enforcement scrutiny from the United States. This malicious network, primarily comprised of compromised small office and home office (SOHO) routers and firewall devices across the globe, has been associated with covert…

Read MoreFollowing FBI Crackdown, KV-Botnet Operators Revise Strategies to Regain Ground

Hacker Impersonates Israeli Security Vendor to Distribute Wiper Malware

Cybercriminals posing as a leading cybersecurity firm in Israel have executed a series of sophisticated wiper attacks targeting professionals within the local cybersecurity community. Reports indicate that these attackers successfully circumvented substantial security defenses, launching their malicious campaigns under the guise of legitimacy. The cybersecurity firm, Eset, confirmed that its…

Read MoreHacker Impersonates Israeli Security Vendor to Distribute Wiper Malware

A Pathway to Success: Establishing a CTEM Operation

In recent years, the landscape of cybersecurity has evolved drastically, presenting significant challenges for businesses striving to protect their assets. The continuous expansion of attack surfaces has heightened risks, making it increasingly difficult for traditional security measures to keep pace. Organizations now find themselves in search of effective solutions to…

Read MoreA Pathway to Success: Establishing a CTEM Operation