Ilya Lichtenstein Sentenced to Five Years for Bitfinex Bitcoin Money Laundering
Ilya Lichtenstein, a computer expert, was sentenced to five years in federal prison for his role in laundering approximately $1 billion in stolen bitcoin from the 2016 Bitfinex hack.
View full story…
Latest Cybernews
Microsoft Power Pages Exposes Sensitive Data Due to Misconfigurations
Misconfigurations in Microsoft Power Pages have led to significant data exposure risks, affecting over 1.1 million NHS employees and potentially exposing millions of records due to improper access controls.
View full story…
Sitting Ducks Attacks Expose Over 1 Million Domains to Cyber Threats
The “Sitting Ducks” attacks exploit misconfigured DNS settings to hijack domains, with nearly 800,000 at risk and significant involvement from threat actors like “Vacant Viper” and “Horrid Hawk.”
View full story…
Chinese Hackers Breach US Telecoms in Major Cyber Espionage Campaign
Chinese threat actors, specifically the group Salt Typhoon, have compromised multiple US telecommunications and internet service providers, gaining unauthorized access to sensitive information and critical communication systems, raising significant national security concerns.
View full story…
Middle Eastern Countries Strengthen Cybersecurity Frameworks Amid Rising Threats
Over the past decade, Saudi Arabia, Qatar, and the UAE have developed advanced cybersecurity regulations in response to increasing cyber threats, although challenges like uneven enforcement and talent retention persist.
View full story…
API Security Incidents Surge in the UK, Affecting 84% of Organizations
A recent study reveals that 84% of UK security leaders experienced at least one API security incident in the past year, marking a significant increase in breaches and highlighting the urgent need for improved security measures.
View full story…
Two Hackers Indicted for Major Cyber Intrusion Affecting Over 150 Organizations
Connor Riley Moucka and John Erin Binns have been indicted for orchestrating a significant cyber intrusion that compromised sensitive data from major companies, including AT&T and Ticketmaster, and extorted victims for millions in cryptocurrency.
View full story…
APT Wirte Expands Cyber Attacks Against Israeli Targets Amid Regional Tensions
The Hamas-affiliated threat actor APT Wirte has shifted from espionage to disruptive cyber attacks, utilizing advanced malware like SameCoin to target Israeli organizations while expanding operations across the Middle East.
View full story…
Latest Cybernews
CISOs Play Crucial Role in Securing AI Adoption Amid Rising Cyber Risks
Chief Information Security Officers are essential in navigating the security challenges of AI integration, addressing governance issues, and mitigating emerging threats associated with generative AI technologies.
View full story…
MOVEit Data Breach Exposes Employee Information of Major Companies
A significant data breach linked to the Cl0p ransomware group has compromised sensitive employee data from organizations like Amazon and HSBC due to a vulnerability in the MOVEit Transfer software, affecting over 95 million individuals.
View full story…
Hive0145 Targets European Businesses With Strela Stealer Malware
The cybercriminal group Hive0145 has intensified its phishing campaigns across Europe, particularly in Spain, Germany, Ukraine, and Italy, using the Strela Stealer malware to compromise email credentials and facilitate Business Email Compromise.
View full story…
Microsoft Addresses 90 Vulnerabilities in November 2024 Patch Tuesday Release
Microsoft’s November 2024 Patch Tuesday release fixes 90 vulnerabilities, including four critical zero-day flaws affecting Windows 11, Active Directory Certificate Services, and Exchange Server, highlighting significant security risks for organizations.
View full story…
AI-Driven Cyber Threats Expected to Escalate in 2025
Researchers at Google Cloud predict that advancements in AI will enhance social engineering tactics and identity fraud, leading to a rise in cybercrime activities such as phishing, vishing, and the use of deepfakes.
View full story…