Tag

Information Security

Are Businesses Prepared for DocuSign Phishing Targeting Government Links?
Cyber Security
Are Businesses Prepared for DocuSign Phishing Targeting Government Links?

A recent surge in sophisticated phishing attacks has exploited DocuSign, primarily targeting businesses that interact with governmental agencies at various levels. Cybersecurity researchers observed a significant 98% increase in DocuSign phishing URLs between November 8 and 14 compared to the preceding two months. These attacks are particularly hazardous as they exploit the inherent trust between businesses and regulatory bodies, creating

Read More
How Do Darknet Services Enable Holiday Shopping Scams and Exploits?
Cyber Security
How Do Darknet Services Enable Holiday Shopping Scams and Exploits?

As the holiday shopping season approaches, both e-commerce businesses and consumers prepare to capitalize on sales and promotions. However, this festive period also marks a peak time for cybercriminal activities. Darknet marketplaces are playing a central role in democratizing access to sophisticated malicious tools, enabling even individuals with minimal technical skills to engage in cybercrimes. This heightened level of activity

Read More
Major Incident at WUTH Hospitals Due to Cybersecurity Issues
Cyber Security
Major Incident at WUTH Hospitals Due to Cybersecurity Issues

The recent declaration of a major incident by Wirral University Teaching Hospital (WUTH) due to an ongoing cybersecurity issue has caused significant disruptions across multiple hospitals under its purview. This incident, although not officially confirmed as a cyber-attack, has led to the cancellation of all outpatient appointments and has forced the Trust to urge the public to use the Emergency

Read More
Matrix DDoS Campaign Exploits IoT Weaknesses and Enterprise Servers
Cyber Security
Matrix DDoS Campaign Exploits IoT Weaknesses and Enterprise Servers

In an era where connectivity defines both personal and professional spaces, the security of internet-connected devices has never been more critical. Recent developments have highlighted the possibility of large-scale cyber-attacks through accessible tools that require minimal technical expertise. Such is the case with a new distributed denial-of-service (DDoS) campaign orchestrated by a threat actor known as Matrix. Analyzing this operation,

Read More
Can Data Sharing Help Reduce Fraud in England and Wales?
Cyber Security
Can Data Sharing Help Reduce Fraud in England and Wales?

The UK’s data protection regulator has recently highlighted a critical issue exacerbating the ongoing fraud epidemic: the hesitancy of organizations to share customers’ personal information. According to official statistics, fraud has become the most prevalent crime in England and Wales, representing nearly 39% of total offenses. The reluctance to share data responsibly, fairly, and proportionately is allowing fraudsters to exploit

Read More
China-Linked Earth Estries Targets Telecom Firms with GHOSTSPIDER Malware
Cyber Security
China-Linked Earth Estries Targets Telecom Firms with GHOSTSPIDER Malware

In recent years, cyber espionage has become an increasingly prominent threat to global security, and one of the key players in this space is the Earth Estries group. This China-linked advanced persistent threat (APT) group has garnered significant attention for its extensive operations across more than 12 countries, predominantly targeting telecommunications companies in Southeast Asia. Earth Estries, active since at

Read More
North Korean IT Workers Impersonate Foreigners to Secure Remote Jobs
Cyber Security
North Korean IT Workers Impersonate Foreigners to Secure Remote Jobs

The increasing number of North Korean IT workers masquerading as professionals from other countries to obtain remote employment and freelance agreements poses a significant threat to global businesses. These individuals focus on software development, mobile applications, blockchain, and cryptocurrency technologies, operating through individual efforts and front companies. The situation highlights the need for heightened vigilance and enhanced security practices to

Read More
Ransomware Attack on Blue Yonder Disrupts Major Retailers Before Holidays
Cyber Security
Ransomware Attack on Blue Yonder Disrupts Major Retailers Before Holidays

The recent ransomware attack on Blue Yonder, a leading supply chain technology provider, has caused significant disruptions for numerous retailers and supermarkets in the US and UK. This incident comes just days before the Thanksgiving holiday, highlighting the vulnerabilities in supply chain management systems and presenting a critical challenge for maintaining retail operations during peak seasons. Immediate Impact on Retailers

Read More
Ransomware Attack on Blue Yonder Disrupts Major Supply Chains
Cyber Security
Ransomware Attack on Blue Yonder Disrupts Major Supply Chains

In a significant blow to several major organizations, a ransomware attack has targeted Blue Yonder, a key supply chain management software provider, causing considerable disruptions across various sectors. Operating out of Scottsdale, Arizona, Blue Yonder provides a range of critical services, including inventory management and distribution systems, as well as generative AI tools tailored for supply chains. The incident was

Read More
Can Cyberattacks on NHS Hospitals Be Prevented?
Cyber Security
Can Cyberattacks on NHS Hospitals Be Prevented?

Recent disruptions at the Wirral University Teaching Hospital in northwest England have reignited concerns about the vulnerability of healthcare systems to cyberattacks. A significant cyber incident disrupted operations, forcing the cancellation of outpatient appointments and highlighting the fragility of cyber defenses in the healthcare sector. The situation escalated to the point where a major incident was declared, advising patients to

Read More
How Will Zing and Checkout.com’s Partnership Transform Payments?
Digital Lending / Digital Payments
How Will Zing and Checkout.com’s Partnership Transform Payments?

In the dynamic world of financial technology, partnerships have often proven to be catalysts for innovation, driving the sector toward more efficient and customer-friendly solutions. The recent collaboration between Zing, a UK-based international payments app, and Checkout.com, a global digital payments provider, promises to be a game-changer for the payments industry. Since its inception, Zing has aimed to make international

Read More
RomCom Exploits Zero-Day Flaws in Firefox and Windows to Deploy Malware
Cyber Security
RomCom Exploits Zero-Day Flaws in Firefox and Windows to Deploy Malware

The sophistication of cyberattacks has reached new heights with RomCom, a notorious threat actor, exploiting zero-day vulnerabilities in both Firefox and Windows to deploy their RomCom RAT malware. These vulnerabilities, identified as CVE-2024-9680 and CVE-2024-49039, have facilitated a series of high-severity attacks that leveraged minimal user interaction to achieve significant security breaches. CVE-2024-9680, a high-severity use-after-free flaw in Firefox, was

Read More