Category: Data Science

SMEs Still An Easy Target For Cybercriminals

SMEs Still An Easy Target For Cybercriminals

According to a Markel Direct poll, cybercrime continues to be a big worry, with 51 percent of SMEs experiencing a cybersecurity incident. Markel Direct surveyed 1000 people on cybercrime and how it affects self-employed people and small businesses. Malware/virus attacks (24 percent), data breaches (16 percent), and phishing attacks (15 percent) were the most common

Read More
Newly Discovered Lapsus$ Ransomware Targets Several Organizations in a Month

Newly Discovered Lapsus$ Ransomware Targets Several Organizations in a Month

With the arrival of 2022, ransomware operators are back in business. Researchers sounded a warning about a newly found Lapsus$ ransomware after only one week of the year had gone. The News During the New Year vacation, Impresa, Portugal’s largest media company, was targeted by the new Lapsus$ ransomware. The gang claimed responsibility for the

Read More
Another T-Mobile cyberattack reportedly exposed customer info and SIMs

Another T-Mobile cyberattack reportedly exposed customer info and SIMs

T-Mobile has been hit by yet another cyberattack, following a large data leak in August. According to papers revealed by The TMo Report, attackers gained access to “a tiny number” of users’ accounts this time. Customers were either victims of a SIM switching attack (which might let someone to bypass SMSbased twofactor authentication), had personal plan information leaked, or both, according to the report. Customers’ billing account name, phone and account number, and information about their plan, including how many lines were tied to their account, were among the customer proprietary network information that was examined, according to the document. The airline announced this summer that a data breach exposed about 50 million customers’ personal information, with the attacker gaining access to social security numbers, names, and dates of birth. (An alleged hacker went on to describe the company’s security methods as “terrible.”) The data allegedly exposed in the December breach is less sensitive (and the documents state that customers who had their SIMs swapped have regained access), and it is likely not as extensive. We couldn’t discover many instances from customers claiming to have received notification letters. Tsupport Mobile’s account appears to have verified the breach, responding to people on Twitter to claim it’s taking “urgent action” to assist anybody who were harmed by the attack. The corporation did not respond to The Verge’s request for comment right away. The damage appears to be far less severe this time around, according to records supplied by The T-Mo Report. Only a small percentage of clients appear to be affected.The documents just state that some information was released, according to the article, but there is no further information regarding what transpired. Customers that have been impacted fall into one of three categories. To begin with, a customer may have merely been impacted by a breach of confidential network information (CPNI). “That’s not great,” the report says, “but it’s a lot less of an impact than the August breach, which exposed customer social security numbers.”The second type of customers who have been affected is those who have had their SIMs switched. In order to get control of a phone number, a hostile actor will alter the physical SIM card connected with the number. This can, and frequently does, result in the victim’s other online accounts being accessed with two-factor authentication codes supplied to their phone number. Customers who were affected by the SIM switch had their actions reversed, according to the paper. The third and final category is just a combination of the first two. Affected customers’ private CPNI as well as their SIM card swap could have been viewed.          

Read More
Echelon Infostealer Drops in via Telegram

Echelon Infostealer Drops in via Telegram

An attack targeting users of several file-sharing and messaging platforms has been discovered using a new variant of the Echelon credential stealer malware. How the news get discovered? SafeGuard Cyber researchers discovered a sample of the Echelon malware posted on a Telegram channel. Telegram handle Smokes Night was used by the attackers to spread the

Read More

Write for Us

    Get in Touch To get Free Demo

    We are available 24 * 7, Contact Us and Avail Exciting Discount Offers​