HomeMalware & ThreatsTrending Cyber Attacks Headlines from Google News

Trending Cyber Attacks Headlines from Google News

Published on

spot_img

Global Sanctions Imposed on Russian-Linked REVIL Ransomware Operator

In a coordinated effort, the governments of Australia, UK, and the United States have imposed sanctions on Alexander Gennadievich, a hacker involved with the Russian-linked REVIL Ransomware group. Gennadievich’s role in the Medibank data breach has raised significant international concerns, as he was responsible for stealing and disseminating sensitive data such as names, email addresses, contact details, passport information, health claims, and insurance coverage details. The effectiveness of the sanctions imposed on both individuals and criminal organizations like REVIL remains uncertain, but it is a step towards holding cybercriminals accountable for their actions.

Trello, a widely used professional messaging app, has suffered a massive data breach that has affected over 15 million users. The hackers managed to gain unauthorized access to user names, email IDs, full names, and other credentials. This breach has raised serious concerns about the security of user data on messaging platforms and highlights the increasing risks associated with cyber attacks. Trello is actively investigating the breach, and a portion of the stolen data has been spotted on a hacking forum for sale. Law enforcement agencies and security experts are collaborating to address and mitigate the risks associated with this breach, but the incident highlights the growing threats posed by cyber attacks against popular applications and platforms.

Privacy Concerns Surround China-Manufactured Biometric Hardware

Privacy concerns have been raised surrounding the use of Chinese-manufactured biometric attendance systems in government organizations in India and Scotland. There are fears that these systems could be used for espionage, with concerns that servers in Beijing could compromise the security of CCTV cameras and biometric systems deployed in sensitive sectors such as the military and defense. To address these concerns, both nations plan to initiate a 90-day surveillance period starting in February. Additionally, considerations are being made to replace the Chinese-manufactured hardware with systems from South Korea to ensure the security of sensitive government operations. This move reflects the growing geopolitical tensions around the use of technology in critical infrastructure and the efforts to mitigate potential security risks associated with foreign-manufactured hardware.

UK Faces Controversy Over Smart Electric Meter Billing

The use of smart electric meters in the UK has come under scrutiny following reports of inexplicable billing discrepancies. Some users have reported being charged based on the accounts of geographically distant individuals, prompting concerns about the accuracy and security of smart metering systems. Social media platforms have been flooded with complaints from users demanding immediate government intervention to address these issues. There is speculation that cyber attacks may have tampered with electric meters, leading to a surge in electricity consumption and subsequent billing concerns. This controversy highlights the importance of ensuring the security and reliability of smart metering systems to protect consumers from potential financial and security risks.

Water Facility in North America hit by Ransomware Attack

Veolia, a water facility that also provides sewage management services, recently experienced a ransomware attack that disrupted some application-related servers. While the impact of the attack was minimal, it had the potential to disrupt approximately 8,500 water and waste water facilities across the United States. This incident underscores the vulnerability of critical infrastructure to cyber attacks and the potential consequences of such attacks on essential services. It also serves as a reminder of the need to invest in robust cybersecurity measures to protect critical infrastructure from malicious actors seeking to exploit vulnerabilities for financial gain or disruption.

Source link

Latest articles

We belong: Q&A with Miriam Saffer – Creative, pragmatic, and resilient.

MIriam Saffer: about being judged or not believed. If an employee trusts you enough...

The Resounding Boom of Cybersecurity: Understanding the Ever-Expanding Industry

The cybersecurity industry is currently experiencing unprecedented growth and innovation due to a variety...

DVIDS News: AvengerCon VIII – Army Cyber’s Homegrown Hacker Con Makes a Comeback

of the big things we missed was being able to share our experiences among...

Troutman Pepper Establishes Incidents and Investigations Team

Troutman Pepper, a prominent law firm based in Orange County, Calif., and Richmond, Va.,...

More like this

We belong: Q&A with Miriam Saffer – Creative, pragmatic, and resilient.

MIriam Saffer: about being judged or not believed. If an employee trusts you enough...

The Resounding Boom of Cybersecurity: Understanding the Ever-Expanding Industry

The cybersecurity industry is currently experiencing unprecedented growth and innovation due to a variety...

DVIDS News: AvengerCon VIII – Army Cyber’s Homegrown Hacker Con Makes a Comeback

of the big things we missed was being able to share our experiences among...
en_USEnglish