HackDig : Dig high-quality web security articles

Email compromise leads to healthcare data breach at Kaiser Permanente

At least 69,000 people have been impacted by a data breach at Kaiser Permanente, a long-running managed healthcare consortium. The latest in a long-running series of healthcare attacks, the road to stolen data began on April 5 this year with an email compromise. The direct path to data A “substitute breach notice” posted June 3 revealed details of t
Publish At:2022-06-15 09:02 | Read:532 | Comments:0 | Tags:Cybercrime attack data breach email employee healthcare kais

Attackers are mailing USB sticks to drop ransomware on victims’ computers

Physical objects as security threats are in the news at the moment. The oft-touched upon tale of rogue USB sticks is a common one. Being wary of random devices found on the floor, or handed out at events is a smart move. You simply don’t know what’s lurking, and it’s hard to find out safely without the right tools available. Even then, something can slip by
Publish At:2022-01-11 08:50 | Read:2591 | Comments:0 | Tags:Cybercrime attack Colonial Pipeline attack fbi malware ranso

Google warns some users that FancyBear’s been prowling around

APT28, also known as FancyBear, is at the heart of another targeted campaign. This time, it’s sniffing around users of Google services. Some 14,000 people have been notified about a spear phish attempt looking to compromise accounts and access their files. When did this happen? Sometime late September, according to the folks at Google. They didn’t go i
Publish At:2021-10-11 10:14 | Read:1386 | Comments:0 | Tags:Malwarebytes news APT28 attack fancybear gmail Google govern

A new wave of ransomware attack hits up to 1,500  businesses worldwide 

It all started on July 2, when attackers targeted the popular remote management and monitoring (RMM) software from a Florida-based IT services company called Kaseya. By taking advantage of a flaw in Kaseya VSA software, ransomware authors gained access to the RMM system and were able to use it to install ransomware on some of Kaseya’s customers network
Publish At:2021-07-06 21:01 | Read:1440 | Comments:0 | Tags:Business Malware attack cyberattack kaseya Ransomware RRM Se

REvil ransomware’s calling, and it’s not good news

The REvil ransomware (AKA Sodinokibi, which operates as a Ransomware as a Service) is adopting some outreach techniques after initial compromise, designed to shame victims into paying up. Shaming victims into action Malware authors and social engineers have relied on shame and the threat of exposure for years. Nothing encourages potential victims to p
Publish At:2021-03-10 05:12 | Read:1888 | Comments:0 | Tags:Ransomware attack blackmail compromise hijack malware ransom

KFC Urges Users to Change Passwords After Attack against Website

Kentucky Fried Chicken (KFC) has told members of its Colonel’s Club to change their passwords following an attack against its website.The fast food giant confirmed that the attack affected only Colonel’s Club users. The loyalty program allows its 1.2 million registered members to collect Chicken Stamps and exchange them for rewards like meals.KFC
Publish At:2016-12-13 17:55 | Read:7863 | Comments:0 | Tags:Latest Security News attack KFC password Website

Furor Over IoT Dangers Could Fuel Innovative Security Measures

By Robert Westervelt Privacy and safety concerns associated with the billions of connected devices known as the Internet of Things could prompt some innovative approaches to data protection, attack prevention and antifraud measures. But as state and federal regulators in the U.S. mull over whether restrictions are required it is becoming increasingly clear t
Publish At:2015-10-24 20:50 | Read:4364 | Comments:0 | Tags:Online Security attack exploit hack IoT vulnerability

Malware Meets SysAdmin – Automation Tools Gone Bad

This post was authored by Alex Chiu and Xabier Ugarte Pedrero.Talos recently spotted a targeted phishing attack with several unique characteristics that are not normally seen. While we monitor phishing campaigns used to distribute threats such as Dridex, Upatre, and Cryptowall, targeted phishing attacks are more convincing because the format of the message i
Publish At:2015-08-25 19:25 | Read:5630 | Comments:0 | Tags:Threat Research Attack Phish RAT Talos trojan worm

Mumsnet Suffers Multiple Attacks

Popular British parenting site Mumsnet has been targeted by a series of attacks, including a DDoS attack and even a “swatting” attack, which led armed officers to the home of founder, Justine Roberts, in the middle of the night.The Twitter account @DadSecurity (which has since been suspended) claimed responsibility for the attacks, and published a database c
Publish At:2015-08-20 17:15 | Read:6087 | Comments:0 | Tags:Latest Security News attack DDoS Infosec Mumsnet Phishing se

The Logjam Attack: What You Need to Know

A group of security researchers and computer scientists have recently uncovered a vulnerability in how a Diffie-Hellman key exchange is deployed on the web. Dubbed as Logjam, the vulnerability affects home users and corporations alike, and over 80,000 of the top one million domains worldwide were found to be vulnerable. The original report on Logjam can be f
Publish At:2015-05-20 14:55 | Read:5482 | Comments:0 | Tags:Security Threat attack diffie-hellman logjam

What the Heck are Zero-Day Attacks? (And 3 Ways to Avoid Them)

If you look for the term zero-day attack in your home dictionary, you probably won’t find it.Go ahead and check…I’ll wait.You might not even find the term in some online dictionaries (though to be fair, it does appear in others.).Nevertheless, if you google the term, you’ll find thousands of references to it, many of them from mainstream sources including Fo
Publish At:2015-05-07 07:35 | Read:7960 | Comments:0 | Tags:Online Privacy Online Safety PC security advanced real-time

Why Hackers Are After The Healthcare Industry

 It’s not your identity they want, or even your credit card number. Those numbers are hard to exploit for quick cash. Banks and card companies have systems that quickly detect fraud.So, why go after an insurance company? Because it’s easy, and they can get away with really good stuff. What the Anthem hackers are after is your medical provider acco
Publish At:2015-02-20 04:12 | Read:9888 | Comments:0 | Tags:Cyber Security Featured Articles Anthem attack Fraud medical

Cybercriminals Steal $1 Billion in “Most Sophisticated Attack the World Has Seen”

A group of hackers were able to penetrate at least 30 financial institutions around the world and steal upwards of one billion dollars, making this attack one of the most advanced the world has yet seen.According to a report published by security firm Kaspersky Lab and sent to the New York Times, the cyber criminals, which have since been named the “Carbanak
Publish At:2015-02-20 04:11 | Read:4216 | Comments:0 | Tags:Latest Security News $1 Billion attack Phishing


Share high-quality web security related articles with you:)
Tell me why you support me <3

Tag Cloud