Category: ➽News
-
The Rise of AI Malware: How to Protect Yourself
AI Enthusiasts gradually become #1 target for cybercriminals Over the years, malware operators have continuously adapted their strategies to capitalize on emerging trends and exploit new vulnerabilities. In the past, they primarily relied on distributing classic “keygen.exe” programs through platforms like YouTube, file sharing and custom fake websites, preying on users seeking free software or…
-
BianLian Ransomware Hits Basel-Stadt Education
Over a Terabyte of Sensitive Data Exposed On Darknet On May 9, 2023, the Department of Education of the Canton of Basel-Stadt fell victim to a massive cyberattack orchestrated by the notorious BianLian ransomware group. The cybercriminals successfully infiltrated the department’s systems and exfiltrated the shocking 1.2 terabytes of sensitive data. According to cyber criminals’ the data…
-
CH Media Falls Victim to Play Ransomware
A Deep Dive into the Cybersecurity Incident Swiss media giant CH Media has become a victim of the notorious Play ransomware, a cyberattack that has left the company reeling and facing the release of sensitive information. This article aims to provide a comprehensive analysis of the incident, including the background of Play ransomware, the details of the attack…
-
Texas.gov reports of a new fraud uncovered
How cyber criminals steal our documents and why. Recently, the Texas Department of Public Safety (DPS) and the Department of Information Resources (DIR) have discovered a fraud activity involving the issuance of driver’s licenses to unauthorized persons. It was determined that criminal organizations abroad obtained personal information through illegal means and used it to create…
-
Why Dark Web Monitoring Should Be a Top Priority for Your Cybersecurity Strategy
Image Source: Unsplash As a cybersecurity expert, I have seen firsthand the devastating effects that data breaches can have on businesses. In today’s digital age, cyber threats are constantly evolving, and one of the biggest threats comes from the dark web. In this article, I will explore the importance of dark web monitoring for…
-
Haveibeenpwned vs. Kaduu: Two different Darknet Monitoring Approaches
What is Haveibeenpwned and how does i work? Haveibeenpwned is a website that allows individuals or organisations to check if their data has been exposed in known data breaches. The website was created by security researcher Troy Hunt in 2013 and has since become a widely used resource for individuals, organizations, and law enforcement agencies…
-
33k Hong Kong exporter’s clients exposed online
Schools, NGOs, government departments and retail utilities at risk. Today, on April 11, a well-known threat actor in the hacking community, going by the name “LeakBase,” shared a database belonging to one of the fastest-growing importers and exporters in Hong Kong. The company, KoreanCorner, focuses on quality creative Korean products and mainly deals with B2B…
-
Beware: New ChatGPT Chrome Extension Will Steal Your Account
Already 9k users fell victim to this add-on. A dangerous new threat has emerged on the Chrome Web Store, putting users’ accounts at risk. Cybercriminals have been caught using a fraudulent version of the popular ChatGPT extension to steal unsuspecting users’ Facebook accounts. What’s particularly alarming is that this malicious variant is posing as the…
-
2.1M Cardholders in Danger as Hackers Celebrate Anniversary
And what does Joe Biden have to do with it? The president of the USA, indeed, has nothing to do with it. However, he is, apparently, very much loved by the cyber criminals, so they have called a darknet market after him. The operators of the carding website called “BidenCash” have marked the first anniversary…
-
Security Breach at Activision: The Importance of Reporting Incidents
Threat actors stole Activision Blizzard internal documents and content. Activision Blizzard, one of the world’s largest video game companies, suffered a data breach on December 4th, 2022. According to vx-underground, threat actors were able to “successfully phish a privileged user on the network and exfiltrate sensitive workplace documents, as well as scheduled to be released…