Home Tags Cyberattacks

Tag: Cyberattacks

Misconfigured Microsoft Power Apps Inadvertently Exposed 38 Mn Sensitive Records

A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from...

Japan-based Liquid Crypto Exchange Hacked; Nearly $100Mn Stolen

Japanese cryptocurrency exchange Liquid admitted that it is a victim of a crypto heist in which unknown hackers accessed digital currency from its digital...

Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign

Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...

Do Phishing Attacks Cost More Than Ransomware?

With increased internet usage during the new normal of remote working, phishing attacks continue to challenge business security defenses. Cyberthugs often distribute malicious codes...

Misconfigured Amazon Bucket Exposes Personal Data of Millions of Senior Citizens

Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat...

Smart or Stupid? Cybercriminal Group Names Decoded!

It’s known that cybercriminals always try to advance their hacking skills and change attack strategies to evade security deductions. Apart from hiding their identity,...

Federal Agencies Score Poor in Securing Sensitive Data: Senate Report

Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...

Suffered a Data Breach? Here’s the Immediate Action Plan

Sensitive information is like money to cybercriminals. Attackers leverage personally identifiable information (PII) exposed in data breaches to launch various cyberattacks or trade it...

Attackers Get Cannier; Found Targeting Non-C-Suite Employees via Spear Phishing

2021 has been witnessing phishing or pretexting — types of social engineering attacks, leading all Data Breach Reports. The fraudulent practice of sending emails...

CISA Launches New Vulnerability Disclosure Policy to Boost Cybersecurity

Despite regular security audits, attackers continue to intrude on business and government networks by exploiting unpatched vulnerabilities. To help federal civilian agencies in the...

MOST POPULAR

RECENT POSTS