Jessica Molden

Microsoft Defender SmartScreen Vulnerability Exploited in Phemedrone Malware Campaign

A Microsoft Defender SmartScreen vulnerability is actively being exploited in a Phemedrone information-stealing malware campaign. The critical vulnerability allows attackers to bypass Windows Defender SmartScreen checks by using a specially crafted Internet Shortcut (.URL) file. Despite being patched in November 2023, threat actors are still exploiting the vulnerability, infecting users with Phemedrone Stealer. The malware […]

Microsoft Defender SmartScreen Vulnerability Exploited in Phemedrone Malware Campaign Read More »

Cosmetics Retailer Lush Faces Cybersecurity Challenge

Cosmetics giant Lush has recently confirmed being a victim of a cyberattack, though specific details about the incident remain scant. The company revealed that it is actively responding to the cybersecurity incident with the assistance of external IT forensic specialists. As the investigation is still in its early stages, Lush has taken immediate steps to

Cosmetics Retailer Lush Faces Cybersecurity Challenge Read More »

Cyberattack Strikes Capital Health Systems in New Jersey

Capital Health Systems in New Jersey experienced a cyberattack in late November, causing a temporary disruption to its IT systems. The attack, attributed to the LockBit ransomware group, resulted in a network outage, but patient care continued. While all systems have been restored, an ongoing investigation aims to determine the extent of the data breach

Cyberattack Strikes Capital Health Systems in New Jersey Read More »

Ransomware Attack on U.S. Navy Shipbuilder Exposes Data of 17,000 Individuals

In April, a ransomware attack on Fincantieri Marine Group (FMG), a company building ships for the U.S. Navy, exposed the information of nearly 17,000 people. The attack caused widespread production issues, disrupting servers that provided information to manufacturing machines. FMG confirmed the cyberattack in a statement to the United States Naval Institute and the Green

Ransomware Attack on U.S. Navy Shipbuilder Exposes Data of 17,000 Individuals Read More »

Zero-Day Vulnerabilities Exploited

U.S. software company Ivanti has confirmed the exploitation of two critical vulnerabilities (CVE-2023-46805 and CVE-2024-21887) in its widely used corporate VPN appliance, Ivanti Connect Secure. These vulnerabilities, described as “zero-day,” allow unauthenticated remote code execution. Ivanti acknowledges fewer than 10 impacted customers, with evidence suggesting one compromise as early as December 3, linked to a

Zero-Day Vulnerabilities Exploited Read More »

Healthcare Entities Face Surge in Cybersecurity Attacks, Disrupting Patient Care and Raising Data Security Concerns

Healthcare entities, particularly hospitals, are frequent targets of cybersecurity attacks, with over 1,400 incidents per week reported by Check Point Research. Liberty Hospital recently experienced a cyber event, disrupting operations and causing a delay in surgeries. Dr. Jeffrey Tully, co-director of the Center for Healthcare Cyber Security, emphasizes the impact of such attacks on patient

Healthcare Entities Face Surge in Cybersecurity Attacks, Disrupting Patient Care and Raising Data Security Concerns Read More »

City of Dallas Cyberattack Widens: Nearly 300 More Victims Revealed in Data Breach

City officials in Dallas revealed that hackers, who targeted the city in a cyberattack, had accessed the personal information of almost 300 more individuals than initially disclosed. The additional individuals, including residents and employees, had their addresses, social security numbers, and other personal details compromised. The disclosure raises the total number of people affected by

City of Dallas Cyberattack Widens: Nearly 300 More Victims Revealed in Data Breach Read More »

Cybercriminals Exploit Verified X Accounts for Malicious Activities

Cybercriminals are targeting verified “Gold” accounts on the social media service X (formerly Twitter), selling them on the Dark Web for up to $2,000 each, according to research by CloudSEK. The Gold badge signifies independent verification by X for high-profile organizations or celebrities. Hackers use various methods, including brute-forcing passwords and stealing credentials, to gain

Cybercriminals Exploit Verified X Accounts for Malicious Activities Read More »

IRS Faces Criticism for Prolonged Delays in Assisting Tax Identity Theft Victims Despite Funding Boost

The IRS has improved taxpayer service and technology after receiving additional funding, but the National Taxpayer Advocate’s annual report to Congress highlights significant delays in supporting victims of tax-related identity theft. Victims are waiting nearly 19 months for the IRS to process their returns and issue refunds, with identity theft resolution times reaching 556 days.

IRS Faces Criticism for Prolonged Delays in Assisting Tax Identity Theft Victims Despite Funding Boost Read More »