Hacktivist group, Anonymous Collective claim to cyber attack the E Visa service of the Bahrain government. The cyberattack on Bahrain government has raised concerns about the cyber security arena of sensitive data protection.
The hacktivist group shared a screen shot of attack of the E Visa services on their social handle as a proof of their attack to be credible. (https://check-host.net/check-report/144796f7k307)The group also placed a link of check host. But crucial details regarding the extent of the breach, compromised information, and the motive behind the attack remain undisclosed.
Mastercard has completed its acquisition of Recorded Future, an AI-based threat intelligence provider. Mastercard has acquired the company for $2.65...
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
The Cyber Express reported that they reached out to the official channels for verification of the cyberattack claim. However, as of now, there has been no response from the government’s end.
While publishing the report, the E visa services appears to be fully functional. It raises the possibility that the hacktivist group may be using the cyberattack as a tactic to gain attention or there might be a different motive behind the assault.
The lack of an official statement has left both citizens and cybersecurity experts in suspense, eagerly awaiting clarification on the situation.
(Media Disclaimer:This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. Infosecbulletin assumes no liability for the accuracy or consequences of using this information.)