Category: Data Breaches

Your blog category

  • From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care

    From the “Department of No” to a “Culture of Yes”: A Healthcare CISO’s Journey to Enabling Modern Care

    Breaking Out of the Security Mosh Pit
    When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare IT environments, he doesn’t mince words: “Healthcare loves to walk backwards into the future. And this is how we got here, because there are a lot of things that we could have prepared for that we didn’t, because we were so concentrated on where we were.”
    This chaotic approach has

  • U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

    U.S. Sanctions Funnull for $200M Romance Baiting Scams Tied to Crypto Fraud

    The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based company named Funnull Technology Inc. and its administrator Liu Lizhi for providing infrastructure to conduct romance baiting scams that led to massive cryptocurrency losses.
    The Treasury accused the Taguig-headquartered company of enabling thousands of websites involved in

  • ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

    ConnectWise Hit by Cyberattack; Nation-State Actor Suspected in Targeted Breach

    ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim of a cyber attack that it said was likely perpetrated by a nation-state threat actor.
    “ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation-state actor, which affected a very small number of ScreenConnect

  • Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

    Cybercriminals Target AI Users with Malware-Loaded Installers Posing as Popular Tools

    Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used as lures to propagate various threats, such as the CyberLock and Lucky_Gh0$t ransomware families, and a new malware dubbed Numero.
    “CyberLock ransomware, developed using PowerShell, primarily focuses on encrypting specific files on the victim’s system,” Cisco Talos researcher Chetan

  • New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

    New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers

    Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS and PE headers, according to new findings from Fortinet.
    The DOS (Disk Operating System) and PE (Portable Executable) headers are essential parts of a Windows PE file, providing information about the executable.
    While the DOS header makes the executable file backward compatible

  • DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

    DragonForce Exploits SimpleHelp Flaws to Deploy Ransomware Across Customer Endpoints

    The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool, and then leveraged it to exfiltrate data and drop the locker on multiple endpoints.
    It’s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were

  • Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

    Chinese APT41 Exploits Google Calendar for Malware Command-and-Control Operations

    Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called TOUGHPROGRESS that uses Google Calendar for command-and-control (C2).
    The tech giant, which discovered the activity in late October 2024, said the malware was hosted on a compromised government website and was used to target multiple other government entities.
    “Misuse of cloud

  • Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

    Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

    Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that could be exploited by unauthenticated attackers to upload arbitrary files.
    TI WooCommerce Wishlist, which has over 100,000 active installations, is a tool to allow e-commerce site customers to save their favorite products for later and share the lists on social

  • Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

    Iranian Hacker Pleads Guilty in $19 Million Robbinhood Ransomware Attack on Baltimore

    An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and extortion scheme involving the Robbinhood ransomware.
    Sina Gholinejad (aka Sina Ghaaf), 37, and his co-conspirators are said to have breached the computer networks of various organizations in the United States and encrypted files with Robbinhood ransomware to demand Bitcoin ransom payments.

  • Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack

    Czech Republic Blames China-Linked APT31 Hackers for 2022 Cyberattack

    The Czech Republic on Wednesday formally accused a threat actor associated with the People’s Republic of China (PRC) of targeting its Ministry of Foreign Affairs.
    In a public statement, the government said it identified China as the culprit behind a malicious campaign targeting one of the unclassified networks of the Czech Ministry of Foreign Affairs. The extent of the breach is presently not