01 Oct 2020

Experts Warn of $15m Global BEC Campaign

A new widespread Business Email Compromise (BEC) campaign has already stolen over $15 million from roughly 150 organizations, according to cybersecurity professionals. The campaign was first discovered when Mitiga, an Israeli incident response specialist, was called in to investigate suspicious activity related to a multi-million dollar transaction. Mitiga then found

Read More
30 Sep 2020

Former Amazon Employee Charged with $1.4m Insider Trading Scheme

On Monday, the Securities and Exchange Commission (SEC) charged a former Amazon finance manager and two family members with inside trading after an investigation concluded the former employee intentionally misused tax details she had access too as part of her role at Amazon. The SEC confirmed that the charges related

Read More
30 Sep 2020

Las Vegas Students’ Personal Data Leaked, Post-Ransomware Attack

A researcher reportedly found an open data cache exposing personally identifiable information for thousands of Las Vegas students that was released after the Clark County School district refused to pay ransom demands made by threat actors after a cyberattack during the first week of school. The exposed information includes names,

Read More
30 Sep 2020

4.83 million DDoS attacks took place in the first half of 2020, a 15% increase

Cybersecurity firm Netscout revealed in a recent report that DDoS attacks soared in the first half of 2020, with attackers honing in on healthcare, e-commerce, and educational services all linked to COVID-19. The DDoS attacks observed in the first half of 2020 exhibited threat actors deploying sophisticated, high-throughput attacks designed

Read More
29 Sep 2020

Google removes 17 Android apps designed to deploy Joker malware

Google has been combatting malicious apps landing in its Play Store for years, trying to figure out loopholes in its systems that allow for these apps to evade detection. Recently, the pervasive malware Joker has found its way into the app buying platform, infecting 17 applications. Google has since removed

Read More
28 Sep 2020

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Cybersecurity experts have expressed concern over a new development from Amazon’s Ring division, which unveiled a new drone feature on its Always Home Camera. The robot drone can fly around the customers’ homes, taking security footage while doing so. This has caused an outcry of concerns over several privacy aspects,

Read More
28 Sep 2020

Alien Android Banking Trojan Sidesteps 2FA

A new variant of the infamous Cerberus banking Trojan named Alien has been ruthlessly targeting victims’ credentials for over 200 popular mobile apps, including Microsoft Outlook and Bank of America. The banking trojan is gaining access to Android devices worldwide through utilizing an advanced authentication bypass tool that allows it

Read More
28 Sep 2020

Suspicious logins reported after ransomware attack on US govt contractor

Last week, US government contractor Tyler Technologies admitted that they had suffered from a ransomware attack that compromised their servers and locked access to some internal documents. However, new information on the case has emerged, as its customers have reported that they observed suspicious logins and previously unnoticed RATs on

Read More
25 Sep 2020

Nigerian Hacker Sentenced to Prison in U.S. for Targeting Government Employees

A Nigerian hacker named Olumide Ogunremi, also known as Tony Williams, has been sentenced to 36 months in prison in the US for his role in a cyber campaign targeting US government employees. Ogunrmei has admitted to the crimes, which consist of computer hacking and identity theft charges. Court documents

Read More
25 Sep 2020

Federal Agency Compromised by Malicious Cyber Actor

The Cybersecurity and Infrastructure Security Agency (CISA) released an analysis report yesterday detailing a recent cyberattack on a federal agency’s network that was achieved through leveraging compromised employee credentials. The cyberattacker was then able to drop harmful and sophisticated malware onto the agency’s system. This malware was able to effectively

Read More