article thumbnail

Top 5 Cyber Attack news headlines trending on Google

CyberSecurity Insiders

Chinese intelligence-backed hacking group APT41 has given a hint that its hackers were behind the cyberattacks launched on Air India and SITA-the IT and Telecom solutions provider to the air travel industry. And as hackers failed to gain any financial gain from the hack, they decided to sell that data via various hacking forums.

article thumbnail

Two hacker groups attacked Russian banks posing as the Central Bank of Russia

Security Affairs

Group-IB has detected massive campaigns targeting Russian financial institutions posing as the Central Bank of Russia. The emails were disguised to look as if they come from the Central Bank of Russia and FinCERT, the Financial Sector Computer Emergency Response Team. years of silent operations”.

Banking 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to establish network security for your hybrid workplace

CyberSecurity Insiders

Instruct the in-house IT team to conduct regular cybersecurity tests by launching false phishing campaigns and attempting to simulate other hacking strategies. Installing a firewall on every workplace computer and tablet can protect the core of each hard drive from malware that may have been accidentally installed.

article thumbnail

The Internet of Things: Security Risks Concerns

Spinone

The Internet of Things (IoT) is a term used to describe the network of interconnected electronic devices with “smart” technology. 75% of Bluetooth Smart door locks have been found to have vulnerabilities that allow them to be easily hacked. billion “things” connected to the Internet , a 30% increase from 2015.

article thumbnail

Reassessing cyberwarfare. Lessons learned in 2022

SecureList

Following these activities, the international hacking collective known as “Anonymous” declared cyber war against Killnet on May 23. Hack and leak. On the more sophisticated end of attacks attempting to hijack media attention, hack-and-leak operations have been on the rise since the beginning of the conflict.

DDOS 136