Thursday , May 8 2025

International

2023 Threat Report: Social Engineering and Web Attacks waves

The overall cyber-threat risks have significantly increased during the second quarter of 2023. The number of unique web attacks being blocked has increased by 24%, resulting in over 700 million unique attacks being blocked every month. Social engineering and web-related threats have become increasingly prevalent among the various cyber risks. …

Read More »

UK electoral Commission hack exposed data of 40 million voters

The UK’s Electoral Commission was targeted by a “sophisticated cyber-attack”, which led to the personal information of many British voters being exposed. In October 2022, the Commission made a shocking discovery – an attack had been detected on its systems after detecting suspicious activity. Attackers accessed the servers of the …

Read More »

Ransomware delivery Via URLs: Reports Unit 42

Threat actors are resorting to employing URLs to send ransomware, as they constantly search for innovative methods to deceive victims and bypass their defenses. They are employing more and more sophisticated tactics to distribute their ransomware is making their actions more dynamic. Threat actors often use different versions of ransomware …

Read More »

Original BreachForums Breached, users PII Data sold Online

The stolen database from the compromised website, BreachForums, has resurfaced, and its remnants are now available for purchase under the name “breached_db_person.” The public has been granted access to extremely sensitive information, including the US No Fly List, FBI’s InfraGard, DC Health Link with Members of Congress data, and much …

Read More »

New rules to Reveal Cyber Attacks Within 4 Days

Securities and Exchange Commission (SEC) of United States has recently given its approval to groundbreaking regulations. These regulations oblige publicly traded companies to promptly disclose any significant cyberattacks within a maximum of four days of detection. This marks a significant departure from the previous method of disclosing computer breaches. “Whether …

Read More »

“TETRA: BURST” Global police, airport radio system and energy vulnerable to hackers

Researchers have discovered that TETRA, a radio technology used by critical infrastructure authorities, port administrations, and police forces, has many serious bugs. These bugs can be exploited by attackers to gain control of the communications. TETRA, the trunked radio system utilized by law enforcement, the military, critical infrastructure, and industrial …

Read More »