menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cyber Crime News

Cyber Crime News

source image

Guardian

6d

read

400

img
dot

Image Credit: Guardian

MoD contractor hacked by China failed to report breach for months

  • The IT company targeted in a Chinese hack that accessed the data of hundreds of thousands of Ministry of Defence staff failed to report the breach for months.
  • Shared Services Connected Ltd (SSCL), an arm of French tech company Sopra Steria, became aware of the breach in February but failed to report it.
  • Payroll records of about 270,000 current and former military personnel, including home addresses, were accessed.
  • SSCL was awarded a contract worth over £500,000 in April to monitor the MoD's own cybersecurity, despite being hacked weeks prior.

Read Full Article

like

24 Likes

source image

Medium

6d

read

177

img
dot

Image Credit: Medium

The History and Advancement of Cybersecurity

  • Cybersecurity began with the focus on physical security of machines and secure communication.
  • The concept of cybersecurity emerged with the development of computer viruses and malware.
  • The development of computer systems led to the development of antivirus software.
  • The rise of the internet and e-commerce brought new challenges, leading to the introduction of firewalls and encryption.
  • Cyber threats continued to evolve, leading to the development of advanced cybersecurity solutions.
  • The expansion of IoT devices and cloud computing created new attack vectors, requiring enhanced security measures.

Read Full Article

like

10 Likes

source image

Gbhackers

6d

read

396

img
dot

DDoS Attack Size Increased by 233.33%, UDP-Based are Popular

  • A recent Nexusguard report reveals a 233.33% increase in the size of DDoS attacks in 2023 compared to the previous year.
  • Despite a drop in the total number of attacks, this rise in attack size indicates a shift towards more potent cyber assaults.
  • UDP-based attacks remained the most popular type of DDoS attacks in 2023, with a 58.29% decrease in frequency.
  • Multi-vector attack combinations, including HTTP Flood, DNS Amplification, and TCP ACK, were identified as significant threats.

Read Full Article

like

23 Likes

source image

Mcafee

6d

read

268

img
dot

Image Credit: Mcafee

How Do Hackers Hack Phones and How Can I Prevent It?

  • Our phones are loaded with personal data that is of high value to hackers. It is crucial to protect ourselves by knowing what to look out for and taking simple precautionary measures. Hackers can attack through hacking software, phishing attacks, Bluetooth hacking and SIM card swapping. Tips to prevent phone hacking include using comprehensive security software, updating the phone and its apps, using a VPN, and avoiding using public charging stations.
  • Password protecting your phone, encrypting your phone, and locking your SIM card are other ways to prevent hacking. Additionally, turning off Bluetooth and Wi-Fi when not in use and using Google or Apple's app store instead of third-party stores are effective measures to protect your phone.
  • Keylogging and Trojans are modes of hacking, where, in the hands of a hacker, snooping information as you type and extracting important data is done. Phishing attacks are also a common form of attack where hackers impersonate a company or trusted individual to get access to your accounts, and install malware to steal information.
  • Professional hackers can use dedicated technologies that search for vulnerable mobile devices with an open Bluetooth connection. In August 2019, the CEO of Twitter had his SIM card hacked by SIM card swapping where a hacker contacts your phone provider, pretends to be you, and asks for a replacement SIM card.
  • Use comprehensive security software on your phone to create a first line of defense against attacks. Update your phone and its apps and use a VPN to stay safer on the go. Avoid public charging stations and keep your eyes on your phone to prevent actual theft.
  • Encrypting your phone can protect your calls, messages, and critical information. Locking your SIM card keeps your phone from being used on any other network than yours. Turn off your Wi-Fi and Bluetooth when not in use. Stay away from third-party stores and stick to using Google or Apple's stores.

Read Full Article

like

16 Likes

source image

Gbhackers

6d

read

368

img
dot

HijackLoader Malware Attack Windows Via Weaponized PNG Image

  • Researchers unveil updates to HijackLoader malware, a versatile modular loader.
  • HijackLoader deploys threats like Amadey, Lumma Stealer, Racoon Stealer, and Remcos RAT.
  • The malware uses a PNG image to decrypt and initiate loading of subsequent stages.
  • Indicators of Compromise (IOCs) and list of MITRE ATT&CK techniques provided to help detect and mitigate the impact of the malware.

Read Full Article

like

22 Likes

source image

Medium

6d

read

53

img
dot

Securing the Future: Implementing NIS 2 Compliance Measures in the UK

  • The blog highlights the intricacies of NIS 2 compliance measures in the UK, covering key components such as vulnerability management, managed security services, penetration testing, data breach notification, security assessment, and risk management.
  • By understanding these components and their implications for cybersecurity resilience, OES and DSPs can ensure compliance with the NIS 2 directive if they are operating within the UK's digital landscape.
  • Implementing comprehensive cybersecurity measures is essential to safeguarding critical infrastructure, ensuring continuity of basic services, and preserving the integrity of sensitive data in the increasingly interconnected digital ecosystem.
  • Regular vulnerability management programs help to identify and mitigate potential vulnerabilities in networks and information systems, significantly reducing the risk of cyber-attacks and data breaches.
  • Managed security services (MSS) providers offer tailored solutions for NIS 2 compliance, including round-the-clock monitoring, threat detection, and incident response capabilities, which can help improve cybersecurity posture.
  • Penetration testing regularly identifies weaknesses in an organization's defenses and strengthens its overall resilience against cyber threats through identifying susceptible areas and proactively addressing vulnerabilities.
  • NIS 2 mandates timely and transparent notification to relevant entities and affected parties in the event of a security incident, highlighting the importance of rapid response and communication to mitigate the impact of cyber incidents.
  • Security assessments regularly confirm and guide compliance with security measures, evaluating effectiveness, identifying areas for improvement, and ensuring alignment with NIS 2 directives and regulations.
  • Risk management plays a critical role in NIS 2 compliance, adopting a risk-based approach to cybersecurity and prioritizing resources and efforts based on the severity and probability of potential threats.
  • Organizations must remain vigilant to cyber threats and adhere to policies and procedures to mitigate risks effectively and ensure compliance in the ever-changing digital ecosystem.

Read Full Article

like

3 Likes

source image

Medium

6d

read

364

img
dot

Image Credit: Medium

Unveiling Cryptojacking Attacks: Is Your Computer Secretly Mining Cryptocurrency?

  • Cryptojacking is the unauthorized use of a victim’s computing resources for mining cryptocurrencies.
  • Hackers use malware to secretly turn your computer into a crypto mining machine.
  • Cryptojacking attacks slow down devices, drive up electricity bills, and benefit attackers.
  • Implementing security measures can protect individuals and organizations from cryptojacking.

Read Full Article

like

21 Likes

source image

Siliconangle

7d

read

740

img
dot

Image Credit: Siliconangle

Dell discloses breach affecting customer purchase database

  • Dell Technologies Inc. has disclosed a breach in its customer purchase database.
  • The breach was reported after a hacker posted on a forum soliciting bids for a dataset stolen from Dell.
  • The threat actor claims to have stolen data about 49 million customers and purchases, affecting individuals, enterprises, schools, Dell partners, and other organizations.
  • While names and addresses were compromised, sensitive information like payment details and passwords were not affected.

Read Full Article

like

17 Likes

source image

Medium

7d

read

87

img
dot

Network Segmentation in Web Hosting: Enhancing Security and Performance with Segmented…

  • Network segmentation in web hosting is significant for enhancing security, control, and performance.
  • Key components of network segmentation include identifying segmentation requirements and implementing segmentation controls.
  • Effective network segmentation allows hosting providers to isolate critical assets, control access, and mitigate security breaches and network congestion.
  • Prioritizing network segmentation demonstrates commitment to security, reliability, and performance optimization in web hosting.

Read Full Article

like

5 Likes

source image

Medium

7d

read

20

img
dot

Image Credit: Medium

Pecalang WordPress Template Kits

  • Pecalang is a WordPress template kit designed for use with the Elementor page builder plugin.
  • The template kit includes 10+ import templates ready for use.
  • It is optimized for use with the free Hello Elementor theme and works with most other themes.
  • The kit is focused on cyber security services and includes plugins and detailed installation instructions.

Read Full Article

like

1 Like

source image

Siliconangle

7d

read

249

img
dot

Image Credit: Siliconangle

AI and the accelerating threat landscape: Insights from Zscaler CISO

  • Artificial intelligence (AI) is a hot topic at the RSA Conference, with discussions on its impact on security.
  • Sam Curry, the global VP and CISO of Zscaler, highlights the increase in efficiency and effectiveness of threat vectors driven by AI.
  • Curry emphasizes the growing threat surface, including the rise of phishing (up nearly 60%) and the persistent issues of ransomware and regulatory pressure.
  • He also mentions the guidance for safety around AI by the Biden administration and the use of liability to change incentives for corporations.

Read Full Article

like

14 Likes

source image

Cybertalk

7d

read

399

img
dot

Image Credit: Cybertalk

Beware of cyber scams: How hackers tried to scam me

  • Beware of cyber crimes as it is a rising threat that people encounter in their everyday lives without realizing it.
  • Recently, an email notification claiming to be from PayPal informed the author that his account had been charged $600 for McAfee Antivirus software.
  • The notification from a generic Gmail account, and asked him to call a customer service number to resolve the issue.
  • The author became suspicious and called the number. He spoke with an individual who was far from being professional.
  • The individual inquired about his location and laptop before providing a form to fill out.
  • When the author said he wasn’t home and didn’t have his laptop, the caller abruptly ended the conversation, proving it to be a phishing attempt.
  • It is essential to verify email sender information and domain names as scammers are increasingly becoming sophisticated.
  • Double-check the authenticity of website URLs before clicking on any links in emails, hover over them to preview the URL.
  • Enable two-factor authentication (2FA) wherever possible to add an extra layer of security.
  • Stay informed and educated by keeping abreast of the latest cyber security threats and techniques.

Read Full Article

like

23 Likes

source image

readwrite

7d

read

311

img
dot

Image Credit: readwrite

Dell warns 49 million customers about massive data breach

  • Dell has warned approximately 49 million customers of a massive data breach.
  • The breach involved unauthorized access to an online portal that stored customer purchase information.
  • Personal information including names, addresses, and hardware details were stolen, but no financial data was compromised.
  • Dell has engaged a third-party forensics firm to investigate the breach and stated that there is not a significant risk to customers.

Read Full Article

like

18 Likes

source image

Securityaffairs

7d

read

112

img
dot

Image Credit: Securityaffairs

Dell discloses data breach impacting millions of customers

  • Dell disclosed a security breach that exposed millions of customers’ names and physical mailing addresses.
  • The breach occurred through a Dell portal containing limited types of customer information related to purchases.
  • Compromised data includes customers’ names, addresses, and hardware and order information.
  • No financial or highly sensitive customer information was revealed in the breach.

Read Full Article

like

6 Likes

source image

Dataprivacyandsecurityinsider

7d

read

332

img
dot

Health Care Entities Continue to Get Pummeled by Cybersecurity Attacks

  • Ascension Health, a major health care entity, has fallen victim to a cyberattack, disrupting its clinical operations.
  • The attack has affected clinical operations in multiple states, including Florida, Indiana, Michigan, Oklahoma, Texas, and Wisconsin.
  • Ascension advises its business partners to assess their connections to Ascension systems for potential risks.
  • Due to the ongoing threat of cyberattacks, health care entities are urged to implement incident response plans and conduct preparedness exercises.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app