Cyberattacks

AI Amplifies Cyber Threats

AI-Amplifies-Cybersecurity-Challenges

AI technology has escalated the cyber threat landscape by enabling less skilled hackers to enhance their capabilities, leading to a surge in AI-driven cyberattacks. Federal cybersecurity officials emphasize the importance of information-sharing and coordination to combat these sophisticated threats. The key to mitigating AI-fueled threats lies in increased collaboration and …

Read More

Ransomware Attacker Use Public Tools

Ransomware-Surge-Exploits-Legitimate-Tools

According to a recent study by Mandiant, there’s been a significant rise in ransomware attacks, with a 75% increase in data leak site posts and a 20% rise in ransomware-related investigations from 2022 to 2023. Attackers are employing common tactics and techniques with slight variations, such as using legitimate tools …

Read More

Malicious Ad Scams

Beware-Utility-Scams-on-Google

Malicious ads related to utility bills continue to target victims, directing them to call centers where scammers collect identities and extort money. Scammers are attempting to legitimize their operations by establishing fake U.S.-based entities, with many fraudulent ads found on Google. The scam campaign primarily targets mobile devices and U.S. …

Read More

Ransomware Targets Education

Fog-Ransomware-Targets-Education

The Fog ransomware group is utilizing stolen VPN credentials and system vulnerabilities to access and encrypt data in virtual environments. Predominantly attacking the US education sector, Fog exploits the common cybersecurity weaknesses during summer vacations. Organizations should continue to educate employees and enforce practices related to secure credential management practices.

Phishing with Word copy paste command

ASEC-discover-Phishing-Scam-Tricks-Users

Phishing emails with HTML attachments are tricking users into pasting malicious commands. The scam uses a fake MS Word message to deceive users into executing a Base64-encoded PowerShell command, leading to malware infection. The executed script downloads and runs an HTA file, ultimately infecting the system with DarkGate malware. Users …

Read More

Massive Data Breach Exposed

Massive-Data-Breach-Exposed

A significant data breach involving a Florida-based firm specializing in background checks and personal information handling was reported today. Criminal group known as USDoD is allegedly selling a database containing 2.9 billion records, which includes sensitive information about US, Canadian, and British citizens. The database reportedly contains full names, addresses, …

Read More

Security Concerns with Windows “Recall”

Windows-Recall-Security-Disaster-Ahead

Microsoft’s upcoming AI feature, Recall, has sparked significant security concerns. Slated for release on June 18th as part of the new Copilot Plus PCs, Recall is designed to capture screenshots of all user activity on a PC, using local AI models to allow quick search and retrieval. Cybersecurity expert Kevin …

Read More

Ticketmaster’s Massive Data Breach

Ticket-Master-Data-Breach

Ticketmaster, a subsidiary of Live Nation, has suffered a significant cyber-attack.The breach potentially affects 560 million customers, compromising names, addresses, phone numbers, and partial payment details. The incident raises concerns about the security of third-party cloud databases; it highlights the growing trend of ransom demands in cyber-attacks; and has wider …

Read More

HHS Shifts Stance on Breach Notifications

HHS-Shifts-Stance-on-Breach-Notifications

The Department of Health and Human Services (HHS) has reversed its previous stance, now allowing Change Healthcare to file breach notifications on behalf of entities affected by the February ransomware attack. Initially, HHS required each impacted organization to individually report breaches, causing frustration among the thousands of affected healthcare providers. …

Read More

Malwarebytes Impersonation Scams 

Malwarebytes-Impersonation-Scams

Cybercriminals are creating fake security product websites, impersonating Malwarebytes to distribute malware.  The malware targets sensitive data, including account tokens, saved card details, system profiles, and browser credentials.  Malwarebytes’ name is being used in various scams, including tech support fraud, exaggerated pricing, phishing emails, and fake resellers.  Avoiding Brand Scams: …

Read More