Yodel parcel delivery service confirmed that it suffered a cyber incident that disrupted distribution operations leaving customers unable to track orders or reach customer support.
Threat actors exploited Log4Shell vulnerability on unpatched VMware servers to gain access, move laterally, deploy malware, and exfiltrate sensitive information.
The Russian hackers call themselves "Killnet" and first made the news in April with declarations of intent to conduct cyber attacks on critical infrastructure in other countries. The group has been linked to prior DDoS campaigns.
Blockchain bridge was hit for about $100 million in crypto hack as attackers potentially exploited a signature vulnerability that security researchers had been warning about on Twitter for months.
Threat actors accessed personally identifiable information (PII) and Social Security numbers of more than 1.5 million customers in the Flagstar Bank data breach.
The country’s leading ride hailing app is reportedly close to coming in line with the new data compliance requirements. Didi had about 377 million active users prior to its delisting from China app stores.
Conti is able to breeze through ransomware attacks in as little as three days thanks to a polished setup that has been years in the making: custom ransomware and tools, a disciplined working schedule and a business-like structure.
The study draws on a sample of over 1,000 C-Suite and board members and analyzed their personal devices and home network security and privacy. 87% of executive devices have no security measures at all installed.
Security researchers with Lookout Threat Lab did not specify who the specific surveillance targets of the Android spyware were, but raised concerns based on the government response to protests in Kazakhstan.
Exploitable features are the favored means by which to penetrate OT devices, and the current research finds that they continue to be an issue in industrial control systems.