Hackers have now posted the country’s mass media as the target of hacking. This has been confirmed by the intelligence source of BGD e-Gov CIRT, the government’s cyber issue watchdog. The hacker group wrote in the post, “We will not only attack on websites, increase your tv channel (Broadcast) security …
Read More »15 August target possible big cyber attack in BD; CIRT Alert
Coming 15 August, there is a possibility to happen a big cyber attack in Bangladeshi infrastructure. This information comes from a situational alert on cyber threats of BD CIRT published on 4 August-2023 Friday. CIRT says, In a response to a declaration made by some religious and ideologically motivated underground …
Read More »“TETRA: BURST” Global police, airport radio system and energy vulnerable to hackers
Researchers have discovered that TETRA, a radio technology used by critical infrastructure authorities, port administrations, and police forces, has many serious bugs. These bugs can be exploited by attackers to gain control of the communications. TETRA, the trunked radio system utilized by law enforcement, the military, critical infrastructure, and industrial …
Read More »Millions of Bangladeshi citizens’ data leak: Techcrunch
Millions of Bangladeshi citizens’ personal information, including full names, phone numbers, email addresses, and national ID numbers, was accidentally leaked through a government website. The breach was initially discovered by Viktor Markopoulos, a researcher employed at Bitcrack Cyber Security, who promptly notified the Bangladeshi e-Government Computer Incident Response Team (CERT) …
Read More »Hackers disrupt Russian satellite communications provider
A group of hackers claiming affiliation with the Wagner Group has taken down Dozor-Teleport, a Russian satellite communications provider used by energy companies and the country’s defense and security services. The attack, which began on Wednesday at 10 p.m. EST, has resulted in the disconnection of Dozor-Teleport from the internet …
Read More »Akira ransomware targets VMware ESXi servers
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. Akira first emerged in March 2023, targeting Windows systems in various industries, including education, finance, real estate, manufacturing, and consulting. Like other enterprise-targeting ransomware gangs, the threat actors steal data from …
Read More »Submarine Cables at Growing Risk of Cyber-Attacks
Insikt Group research examines the complex and dynamic risk environment of submarine cables, the information superhighways that underpin the global economy and facilitate worldwide telecommunications. The rapid expansion of the submarine cable network in the 21st century, driven by data demands, cloud computing, and the needs of hyperscalers like Amazon, …
Read More »Two big energy giant hit by cyber attack, who are in list next?
Petro-Canada gas stations, following a cyberattack on parent company Suncor: Suncor is a Canada-based energy company that owns a network of more than 1,800 Petro-Canada retail and wholesale locations. On June 25, Suncor said it had experienced a cybersecurity incident that may impact some transactions with suppliers and customers. The …
Read More »Twitter Hacker Sentenced to 5 Years in Prison for $120,000 Crypto Scam
Joseph James O’Connor, a 24-year-old British citizen, was sentenced to five years in prison in the United States for his role in the July 2020 Twitter hack. O’Connor, who went by the online alias “PlugwalkJoe,” pleaded guilty to criminal schemes that included unauthorized access to Twitter’s backend tools, SIM swapping …
Read More »Microsoft says disruptions to Outlook, cloud platform, were cyberattacks
InfoSecBulletin by Associated Press: In early June, sporadic but serious service disruptions plagued Microsoft’s flagship office suite — including the Outlook email and OneDrive file-sharing apps — and cloud computing platform. A shadowy hacktivist group claimed responsibility, saying it flooded the sites with junk traffic in distributed denial-of-service attacks. Initially …
Read More »