Phishing


US publication house targeted by threat actors!

US publication house targeted by threat actors!

album-art
00:00

 

One of the largest newspaper groups in the US- Lee Enterprises, faced the brunt of a cyberattack recently. The newspaper giant, which has readership across 72 markets in 25 states, reported the unfortunate incident of a cyberattack on February 7, 2025. The attack forced the media conglomerate to temporarily bring down its IT infrastructure offline.

(more…)

A staggering 1M patients affected after a critical data breach at the Community Health Center

A staggering 1M patients affected after a critical data breach at the Community Health Center

album-art
00:00

 

A significant data breach has occurred at the Community Health Center (CHC), a US-based nonprofit organization providing patient-centered healthcare. This is the third case within a span of just 7 days.

(more…)

GhostGPT- GenAI model that boosts cybercrime

GhostGPT- GenAI model that boosts cybercrime

album-art
00:00

 

Artificial Intelligence is dangerous when manipulated and exploited by threat actors. One such recent example of AI menace is GhostGPT. It’s yet another AI chatbot that was developed with the sole purpose of making it easy and convenient for cybercriminals. This unrestricted generative AI model has garnered immense popularity within days of its launch.

(more…)

Volkswagen data breach impacts a whopping 800K EV users!

Volkswagen data breach impacts a whopping 800K EV users!

album-art
00:00

 

The automotive industry is increasingly becoming a popular pick among threat actors. Because of its perceived vulnerabilities and dynamic trends, the automotive industry is no longer safe from the prying eyes of cybercriminals. The recent data breach at Volkswagen is no different. The cyber incident exposed the personal data of 800K EV customers!

(more…)

DDoS attacks spike as Africa embraces rapid digitization!

DDoS attacks spike as Africa embraces rapid digitization!

album-art
00:00

 

Africa’s rapid digitization attempts have made it a prime target among threat actors. Jumping onto the digitization bandwagon just to stay relevant without having the proper knowledge, resources, and infrastructure is affecting Africa badly.

(more…)

India witnesses a steep rise in the number of API attacks!

India witnesses a steep rise in the number of API attacks!

album-art
00:00

 

India has been experiencing an alarming rise in API (Application Programming Interface) attacks, with banking and utilities sectors emerging as primary targets. APIs, the backbone of digital services and communications systems, are becoming vulnerable with each passing day.

(more…)

Guidelines to follow to send emails to Gmail recipients

Guidelines to follow to send emails to Gmail recipients

album-art
00:00

 

Google has always prioritized protecting its users and preventing phishing attempts. To achieve this, it has established strict guidelines for sending emails to Gmail users. Violating these guidelines can result in your emails being marked as spam or bouncing back, instead of successfully reaching the inboxes of your intended recipients.

These measures are part of Google’s phishing protection efforts to ensure a secure and reliable email environment.

(more…)

Threat actors kill multiple birds with one stone!

Threat actors kill multiple birds with one stone!

album-art
00:00

 

Blue Yonder, an AI-oriented supply chain management platform, has been attacked by threat actors. The breach, identified as a ransomware attack, happened on November 21st, 2024. The attack has resulted in a massive impact on the company’s major infrastructure, which it utilizes to offer premium services to its customer base.

(more…)

Apple enthusiasts must know about the two privacy issues in iPhones and iPads!

Apple enthusiasts must know about the two privacy issues in iPhones and iPads!

album-art
00:00

 

Just when the whole world is going gaga over the latest launch of iPhone 16 Pro, a piece of news stunned every Apple enthusiast. The voiceover feature of iPhone and iPad could read out passwords aloud, thereby raising serious privacy concerns. Although Apple has now patched the two bugs, Apple users are feeling a bit concerned about data safety.

(more…)

FBI joint operation dismantles Chinese state-sponsored botnet

FBI joint operation dismantles Chinese state-sponsored botnet

album-art
00:00

 

The FBI recently managed to dismantle a massive Chinese state-sponsored cyberattack in a joint operation. The hacker group, known by the name of Flax Typhoon, used a botnet to attack thousands of devices and gain access to the US and overseas data. The ultimate goal of the attack was to create disruption and steal sensitive data. The botnet primarily targeted devices such as digital video recorders, IoT gadgets, and routers, thereby making it a highly sophisticated network dedicated to carrying out malicious cyberattacks.

(more…)

Fortinet data breach compelling enterprises to rethink cloud security!

Fortinet data breach compelling enterprises to rethink cloud security!

album-art
00:00

 

Fortinet, a security vendor based in California, has recently released an official confirmation regarding a data breach. The hacker, known by the name of FortiBitch, has leaked 440GB worth of data on BreachForums. Fortinet believes that the data breach is not that big of a deal and has impacted only a ‘small number’ of Fortinet users.

(more…)

Google Pixel phones are no longer safe because of this malicious APK!

Google Pixel phones are no longer safe because of this malicious APK!

album-art
00:00

 

Do you own a sleek, stylish Google Pixel phone? Then you have to see this!

(more…)

BlankBot Trojan targets Turkish Android users!

BlankBot Trojan targets Turkish Android users!

album-art
00:00

 

Turkish language speakers are being targeted by a malicious Android program. This program is targeting them with the sole purpose of gaining access to users’ sensitive data.

(more…)

Delhi electricity bill scam- Discoms issue warning against cyber fraud!

Delhi electricity bill scam- Discoms issue warning against cyber fraud!

album-art
00:00

 

A sudden spike in the number of cyber scam incidents has led to panic among electricity consumers in Delhi, India. Power distribution companies or discoms have warned consumers to be highly vigilant while paying their bills online

Recently, a Delhi-based doctor has been scammed by a similar cyber fraud. He clicked on a malicious link to pay his electricity bill and lost a staggering INR 6 lakh.

(more…)

Australian hacker pulled off a fake Wi-Fi network scam in not 1 but 3 Australian domestic airports!

Australian hacker pulled off a fake Wi-Fi network scam in not 1 but 3 Australian domestic airports!

album-art
00:00

 

Threat actors never fail to surprise us with their out-of-the-box ideas and this time also, it’s no different! An Aussie got arrested as he was trying to gain access to passengers’ data by creating a fake Wi-Fi access point.

(more…)

LockBit claims to publish 33 terabytes worth of sensitive data of the US Federal Reserve Bank online

LockBit claims to publish 33 terabytes worth of sensitive data of the US Federal Reserve Bank online

album-art
00:00

 

The LockBit ransomware gang, known for its Russian connection, has just claimed to publish a huge cache file that it allegedly stole from the US Federal Reserve Central Banking System. LockBit published 21 different links that contain important files. These files seem to belong to the torrents, archived files, and parent directories of Evolve Bank and Trust. Here’s the catch- Evolve Bank and Trust was recently restricted for unethical and unsafe banking practices.

(more…)

Newbie CoralRaider Targets Asian Brands To Extract Social Media Data

Newbie CoralRaider Targets Asian Brands To Extract Social Media Data

 

There’s a new kid named CoralRaider in the block of Vietnamese cyber criminals. These cyber attackers have targeted Asian organizations and brands with the aim of gaining access to social media account details and sensitive user data. The specialty of CoralRaider lies in seamless data extraction through legitimate services and social engineering tactics

(more…)