News

Hackers Hijack Chrome Extensions Across Multiple Companies

A Surge in Chrome Extension Attacks A wave of cyberattacks has targeted Chrome browser extensions, impacting several companies, including Cyberhaven, a California-based data protection firm. The attackers gained unauthorized access to developer ac…

Nour Waazize

Biden Administration Proposes New Healthcare Cybersecurity Rules

Addressing Recent Healthcare Data Breaches Following significant data breaches at major healthcare organizations, the Biden administration has introduced a proposal for stricter cybersecurity regulations. These measures aim to enhance data protect…

Nour Waazize

Chinese Hackers Infiltrate U.S. Telecom Networks

Massive Espionage Campaign Uncovered A Chinese state-sponsored hacking group, known as Salt Typhoon, has breached multiple U.S. telecommunications networks. The intrusion allowed the group to gain unauthorized access to sensitive data, including geo…

Nour Waazize

Android Users Targeted by Russian Spyware

Russian Spyware Targets Android Devices Cybersecurity experts have uncovered a sophisticated campaign by Russian threat actors targeting Android devices. This malware is disguised as legitimate applications, tricking users into installing malicious…

Nour Waazize

FBI and CISA Advise Against SMS-Based Two-Factor Authentication

FBI and CISA Issue Warning on SMS-Based Two-Factor Authentication The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have released an advisory urging individuals and organizations to reconsider using SMS-based two-factor authen…

Nour Waazize

Cybercriminals Exploit Google Calendar to Spread Malicious Links

A New Twist on Phishing Attacks Cybercriminals have adopted an unconventional approach to phishing by exploiting Google Calendar. Users are receiving phishing emails that appear to originate from Google Calendar, leveraging the platform's reput…

Nour Waazize

Iranian Hackers Use IOCONTROL Malware to Target OT, IoT Devices

The CyberAv3ngers Group and IOCONTROL Malware A threat actor known as CyberAv3ngers , allegedly linked to Iran, has launched a new wave of attacks using IOCONTROL malware . This sophisticated malware targets Operational Technology (OT) and Internet…

Nour Waazize

US Indicts North Koreans for Posing as IT Workers

The Scheme Unveiled The U.S. Department of Justice (DOJ) indicted 14 North Koreans and three Chinese nationals for orchestrating a scheme where North Korean operatives posed as remote IT workers for American companies. This elaborate operation all…

Nour Waazize

Quantum Computing and the "Cryptopocalypse" Threat

The Cryptographic Risk Landscape As quantum computing advances, experts have raised alarms about a potential "cryptopocalypse," a scenario where quantum computers break widely used encryption methods like RSA and ECC. These encryption tec…

Nour Waazize

Chinese Cyberespionage Campaign in the U.S.

Scope of the Metadata Breach China's cyberespionage group, "Salt Typhoon," accessed metadata from U.S. telecom providers, exposing sensitive details about millions of Americans. Metadata reveals critical information, including who was …

Nour Waazize

Phishing Campaigns Exploiting Corrupted Files

How Corrupted Files Bypass Defenses Hackers have developed a new phishing tactic that uses corrupted ZIP and Microsoft Office files to evade antivirus software and email filters. These files exploit recovery features in software like Microsoft Word …

Nour Waazize

Romanian Election Infrastructure Under Siege

Massive Scale of Cyberattacks Romania’s election systems endured over 85,000 cyberattacks in a coordinated effort that combined credential leaks and a TikTok-based influence campaign. These incidents represent an alarming escalation in targeting dem…

Nour Waazize

Cybersecurity Workforce Shortage: A Growing Global Concern

The Expanding Cybersecurity Gap The cybersecurity sector faces an alarming workforce shortage, now estimated at over 4 million professionals globally. This shortage is exacerbated by the increasing complexity of cyber threats and the rapid digital t…

Nour Waazize

Quantum Computing and Finance Security: A New Cyber Frontier

The Emerging Threat of Quantum Computing The integration of quantum computing into the finance sector poses both revolutionary opportunities and significant security risks. Quantum computers, with their immense computational power, can potentially b…

Nour Waazize

Surge in Healthcare Sector Attacks

Overview of the Healthcare Targeting Trend Healthcare institutions in the U.S. are facing an escalating wave of ransomware attacks. These attacks disrupt critical services, often leading to significant operational delays. Criminal groups exploit the…

Nour Waazize

Financial Services Data Breach

Scope and Impact of the Breach A major U.S. financial services company suffered a significant data breach, exposing sensitive customer data, including personal identifiers and account details. While the company has not disclosed the total number of …

Nour Waazize

GoZone Ransomware: Extreme Coercion Tactics

Threat Tactics and Psychology  The GoZone ransomware, discovered recently, stands out for its psychological manipulation tactics to pressure victims into paying ransoms of approximately $1,000 in Bitcoin. The ransomware not only encrypts files but a…

Nour Waazize

GootLoader Campaign via SEO Poisoning

SEO Poisoning as an Entry Tactic  The latest GootLoader campaign leverages SEO poisoning to lure victims, a tactic that manipulates search engine results to lead users to malicious websites. In this case, GootLoader operators target highly specific …

Nour Waazize
Load More
That is All