Microsoft stops hackers trading fraudulent Outlook accounts
Microsoft recently seized a number of malicious websites and infrastructure used to trade fraudulent Outlook accounts. The Vietnamese cybercriminals of Storm-1152 were selling the accounts.
The Vietnamese cybercriminals of Storm-1152 had registered about 750 fraudulent Outlook accounts. By resel... Read more
These are the most hacked passwords and tactics used in cybercrime
UK payment provider Dojo analyzed over 6 million passwords from the RockYou2021GitHub collection of breached password lists. The study uncovered frequently used passwords, their average length, and the popular subjects that appeared in numerous breaches.
Hackers employ various tactics to crack p... Read more
IBM report: fewer ransomware incidents, rise in backdoor deployments
IBM Security X-Force has released its annual Threat Intelligence Index report, which reveals that while ransomware's share of incidents has declined slightly, defenders were more successful in detecting and preventing ransomware.
According to the report, deploying backdoors that allow remote acc... Read more
Microsoft has more than 100 ransomware criminals in its sights
According to research by Microsoft Intelligence, more than 100 cybercriminals or criminal groups are currently actively using ransomware as their primary weapon. Also to offer ransomware as a service. This is what the tech giant says in a Twitter thread about ransomware.
According to the Twitter... Read more
Wave of Fargo ransomware attacks hits Microsoft SQL servers
Cybersecurity experts warn of hackers exploiting and targeting vulnerabilities in Microsoft SQL servers exposed to the internet through a new wave of Fargo ransomware cyberattacks.
BleepingComputer informed users of a similar cyberattack on Microsoft SQL servers in February. Another wave occurre... Read more
FishPig discovers exploit that puts 200,000 websites at risk
200,000 sites risk having their data compromised due to an exploit in FishPig's software.
FishPig is a UK-based e-commerce software developer. Organizations use its Magento and WordPress plugins to streamline processes. FishPig recently discovered that attackers had found a backdoor into the sec... Read more
Business leaders don’t focus on cybersecurity until breached
Top management only becomes aware of cybersecurity after a significant threat occurs. A shift to a proactive approach is necessary to ensure survival in the current digital landscape.
A report from the UK Department for Culture, Media, and Sport (DCMS) that interviewed several managing partners... Read more
Luca Stealer malware spreads rapidly after code shared on forum
A rust-based malware named Luca Stealer spread rapidly after its source code was published on a cybercrime forum.
The data-stealing malware is programmed in Rust. Dubbed 'Luca Stealer', the malware was first shared at the beginning of July. The developer posted the code on a cybercrime forum and... Read more
‘Lapsus$ is masterminded by 16-year-old Brit’
Reportedly, Lapsus$ is led by a 16-year-old British male. The criminal group recently managed to penetrate Microsoft, Nvidia, Okta and Samsung.
Bloomberg writes that cybersecurity experts acting on behalf of affected organizations traced the attacks to a 16-year-old British male. The teenager re... Read more
IKEA’s email system riddled with cyberattacks
IKEA has recently been tackling phishing attacks towards its employees. The attacker uses stolen reply-chain emails to lure employees into a false sense of security and click malicious links.
Cyberattacks are becoming an everyday occurrence, and organizations worldwide are falling prey to meticu... Read more