Developing countries are being used by hackers to try out new ransomware strains

Developing countries are being used by hackers to try out new ransomware strains

IT security pros are not the only ones with sandboxes and honeypots to test malware in, as hackers are doing the same – in developing parts of the world. A report from Performanta says that many hackers would first try out new malware strains in developing countries, before targeting companies in the developed world. The … Read more

UnitedHealth confirms major cyberattack, says hackers stole “substantial” amount of patient data

UnitedHealth confirms major cyberattack, says hackers stole “substantial” amount of patient data

UnitedHealth Group has issued an update on the data breach that recently struck its subsidiary, Change Healthcare. The healthcare giant suffered a ransomware attack that knocked some of its services offline and affected different pharmacies and other adjacent businesses across the United States. In an update, UnitedHealth Group said that based on initial targeted data … Read more

Microsoft says Russian hackers are exploiting an ancient printer security flaw

Microsoft says Russian hackers are exploiting an ancient printer security flaw

Russian state-sponsored threat actors were observed abusing an old printer vulnerability to drop custom malware on target endpoints. The malware helped them exfiltrate sensitive data and login credentials. This is according to a new report from Microsoft Threat Intelligence, published earlier this week. As per the report, since mid-2019, a group known as Fancy Bear … Read more

Hackers are loading SVG files with multi-stage malware in new phishing attack

Hackers are loading SVG files with multi-stage malware in new phishing attack

A sophisticated new phishing attack was spotted in the wild, leveraging a wide variety of tools to bypass antivirus protections and ultimately deliver different Remote Access Trojan (RAT) malware. According to cybersecurity researchers at Fortinet, an unidentified threat actor was seen sending phishing emails, stating a shipment has been delivered, and attaching an invoice. This … Read more

Hospital helpdesks targeted by hackers — US Health Department warns health services are under threat

Hospital helpdesks targeted by hackers — US Health Department warns health services are under threat

The US Department of Health and Human Services (HHS) has issued a warning that hackers are attempting to target the helpdesks of hospitals in order to gain access to critical hospital systems. The hackers have been observed contacting hospital IT help desks using local area code phone numbers and then pretending to be a hospital … Read more

Hackers can now hijack your face. Here’s how to fight back

Hackers can now hijack your face. Here’s how to fight back

The future of mobile malware is here. For the first time, cybercriminals are infiltrating iOS and Android devices and stealing user face scans. Then, armed with the power of deepfakes and AI, they’re replicating the user’s likeness to break into their bank accounts. Yes, you read that correctly. Today’s technology allows bad actors to spoof … Read more

Hackers are already attacking this Microsoft SharePoint vulnerability, so patch now

Hackers are already attacking this Microsoft SharePoint vulnerability, so patch now

The US Cybersecurity and Infrastructure Security Agency (CISA) has added a new Microsoft Sharepoint Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, signaling that hackers have begun exploiting it in the wild. The vulnerability is tracked as CVE-2023-24955, and carries a severity score of 7.2. It is described as a critical remote code execution … Read more

Ray framework flaw exploited for hackers to breach servers

Ray framework flaw exploited for hackers to breach servers

The Ray framework, an open source tool for AI and Python workload scaling, is vulnerable to half a dozen flaws that allow hackers to hijack the devices and steal sensitive data.  This is according to cybersecurity researchers from Oligo, who published their findings on a new hacking campaign they dubbed “ShadowRay”.  Apparently active since early … Read more

This security flaw could let hackers unlock hotel doors across the world by hijacking keycards

This security flaw could let hackers unlock hotel doors across the world by hijacking keycards

Security researchers have found a relatively easy and cheap way to clone the keycards used on three million Saflok electronic RFID locks in 13,000 hotels and homes all over the world. The keycard and lock manufacturer, Dormakaba, has been notified, and it is currently working to replace the vulnerable hardware – but it’s a long, … Read more

Apple Silicon Vulnerability Allows Hackers to Extract Encryption Keys

Apple Silicon Vulnerability Allows Hackers to Extract Encryption Keys

An unpatchable vulnerability has been discovered in Apple’s M-series chips that allows attackers to extract secret encryption keys from Macs under certain conditions, according to a newly published academic research paper. Named “GoFetch,” the type of cyber attack described involves Data Memory-Dependent Prefetchers (DMPs), which try to predict what data the computer will need next … Read more