Tag: Cyberattacks
How to Protect Your Credit Card Data Online
Sensitive financial data remains a primary target for cybercriminals. Adversaries often target sensitive financial data such as credit/debit card numbers, CVV, and other bank...
Email Threats Continue to be Gateway of Major Cyberattacks
Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...
Attackers Use Fake FMWhatsapp to Spread Triada Trojan
From data privacy violations to fake applications, WhatsApp has been in the news for various reasons since the beginning of 2021. The popular instant...
Misconfigured Microsoft Power Apps Inadvertently Exposed 38 Mn Sensitive Records
A configuration issue in Microsoft Power Apps resulted in a massive data breach, exposing the sensitive information of millions of users. An analysis from...
Japan-based Liquid Crypto Exchange Hacked; Nearly $100Mn Stolen
Japanese cryptocurrency exchange Liquid admitted that it is a victim of a crypto heist in which unknown hackers accessed digital currency from its digital...
Iranian APT Group “Siamesekitten” Targets Israeli Firms in a Cyberespionage Campaign
Security researchers uncovered a new cyberespionage campaign by Iranian hackers targeting IT and telecom companies in Israel with supply-chain attacks. Tracked as Siamesekitten (also...
Do Phishing Attacks Cost More Than Ransomware?
With increased internet usage during the new normal of remote working, phishing attacks continue to challenge business security defenses. Cyberthugs often distribute malicious codes...
Misconfigured Amazon Bucket Exposes Personal Data of Millions of Senior Citizens
Whether it’s critical corporate data or students’ information, threat actors often misuse sensitive data obtained from security data breaches. Recently, security researchers from threat...
Federal Agencies Score Poor in Securing Sensitive Data: Senate Report
Companies lose trust when they fail to protect user data or implement necessary security advancements. Organizations bear the blame whenever attackers exploit unpatched vulnerabilities...
Suffered a Data Breach? Here’s the Immediate Action Plan
Sensitive information is like money to cybercriminals. Attackers leverage personally identifiable information (PII) exposed in data breaches to launch various cyberattacks or trade it...