Cyber Attack
-
Read moreLEGO's official website was hacked briefly to promote a fraudulent cryptocurrency token, urging visitors to buy a "LEGO Coin" in exchange for Ethereum. While the breach lasted just over an hour, no user accounts were compromised, but the incident highlights the growing risks of online scams targeting high-profile platforms.
-
Read moreComcast and Truist Bank customers are the latest to be affected by a massive data breach at Financial Business and Consumer Solutions (FBCS). The breach, initially reported in early 2024, compromised the personal details of millions of individuals, including Social Security numbers and account information, raising concerns about identity theft and data misuse.
-
Read moreA sophisticated cyberattack has crippled Uttarakhand's IT infrastructure, rendering over 90 government websites, including the CM helpline, non-functional. This unprecedented breach has halted essential online services and internal operations across the state, with cybersecurity experts working tirelessly to restore the systems.
-
Posted: September 30, 2024Comments: 3Views: 246Read moreCyber fraudsters have devised a new tactic by misusing the 1930 toll-free helpline number, intended for reporting cybercrimes, to deceive unsuspecting individuals. In a recent case reported in Hyderabad, a complainant was duped of ₹29.55 lakh after being coerced into joining a fraudulent video call by criminals posing as law enforcement officials.
-
Posted: September 27, 2024Views: 148Read moreMicrosoft has recently highlighted a significant security threat posed by the threat actor known as Storm-0501, marking a concerning trend in ransomware attacks that extend into hybrid cloud environments.
-
Read moreThe Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding ongoing cyberattacks on critical infrastructure, particularly targeting Operational Technology (OT) and Industrial Control Systems (ICS). These attacks are being executed using basic methods, such as brute force attacks and exploiting default credentials, impacting vital sectors like water and wastewater systems.
-
Posted: January 23, 2024Views: 46Read moreIn a digital age where information is power, the ‘Mother of all Breaches’ (MOAB) has shaken the foundations of online
-
Read moreIn a concerning turn of events, cybercriminals are revisiting a familiar strategy by exploiting TeamViewer, a widely used remote access
-
Read moreArctic Wolf, a cybersecurity company, has uncovered instances where organizations victimized by the Royal and Akira ransomware groups were targeted by an imposter posing as a security researcher.
-
Read moreAttention smartphone enthusiasts, especially those using Samsung Galaxy devices! Be mindful of a recent surge in unusual hacking incidents that