In the UK, the National Health Service topped the list of the government organizations most frequently impersonated in email scams, according to a recent report released by the National Cyber Security Centre. The report uses findings from the popular Suspicious Email Reporting Service, which received 6.4 million reports last year.
The developer behind the open source machine learning framework PyTorch learned of a malicious dependency mimicking one of its own. According to PyTorch, the malicious dependency was available on a leading code repository over the Christmas period and had the same name as a legitimate dependency. However, the malicious version
Security researcher Dominic Alvieri raised the alarm on several social media accounts and fake websites claiming to sell the sough after hacking tool Flipper Zero. The fraudulent sites are designed to lure cybersecurity professionals into making cryptocurrency transactions. The type of phishing is known as angler phishing and is a
A hacker listed data for sale on a public hacker forum on December 31 claiming that the data was stolen from Swedish vehicle manufacturer Volvo Cars. The hacker alleges that the data breach was a result of a ransomware attack conducted in late December. The hacker further claims that the
The European Union member states have begun planning for the implementation of coordinated controls on passengers arriving from China. This could include mandatory pre-travel testing to avoid consequences of China’s sudden reversal of its zero-Covid policy. The decision will likely be finalized on Wednesday and would follow in the path
Research by cybersecurity firm Dr. Web has found that a new strain of Linux malware is targeting websites based on WordPress. The malware has been named Linux.BackDoor.WordPressExploit.1 and targets 32-bit versions of Linux. The malware is primarily used to hack websites based on content management systems and to inject malicious
Emsisoft has reported that there was no spike in ransomware attacks reported in 2022. The report found that over 200 organizations in the healthcare, government, and education sectors were compromised by ransomware in the past year, representing a similar figure to 2021. Emsisoft published the findings in a recent report
Two JasperReports flaws have been added to the US Cybersecurity and Infrastructure Security Agency’s (CISA) Exploited Vulnerabilities Catalog. The library is reportedly the world’s most popular open source reporting engine and now includes flaws in the JasperReports software that enable non-technical users to create reports and perform more functions. The
Indiana Attorney General Todd Rokita has confirmed that Google will pay Indiana roughly $20 million to resolve a lawsuit regarding alleged deceptive location tracking practices. The state of Indiana sued the technology giant due to an investigation that concluded Google continued to track users’ location data after they opted out.
The prolific LockBit ransomware group has not only apologized to a children’s hospital for conducting a ransomware attack, but has also provided it with a free decryption key. The attack targeted Toronto’s Hospital for Sick Children (SickKids) on December 18, 2022. The facility is Canada’s largest pediatric hospital and admitted