Isha Marathe reports: Even before Russia’s invasion of Ukraine, cyberattacks had been on the rise, leading to provisions from regulatory bodies such as the mandatory disclosures of incidents to protect investors and alert other businesses alike. Now, some attorneys and cybersecurity experts are asking if forced reporting of breaches and attacks at the level of detail that the U.S….
Category: Commentaries and Analyses
Cloudflare Thwarted Largest Ever HTTPS DDoS Attack
The DDoS attack originated from 121 countries and was powered by a small botnet of only 5,067 hacked IoT devices. Debra Ahmed reports: Cloudflare has reported stopping a record-breaking HTTPS DDoS attack (distributed denial of service attack) this month. The company claims this attack peaked at 26 million requests per second (RPS), making it the largest ever…
Ransomware gang creates site for employees to search for their stolen data
Lawrence Abrams reports: The ALPHV ransomware gang, aka BlackCat, has brought extortion to a new level by creating a dedicated website that allows the customers and employees of their victim to check if their data was stolen in an attack Read more at BleepingComputer.
Cybercriminals use reverse tunneling and URL shorteners to launch ‘virtually undetectable’ phishing campaigns
Stephen Pritchard reports: A new way of carrying out phishing attacks is being adopted by criminal groups – and it could make threat actors virtually undetectable, security researchers warn. The technique involves using ‘reverse tunnel’ services and URL shorteners to launch large-scale phishing attacks. What’s more, the groups using these techniques leave no trace. Instead, threat actors…
Updates to the MCG Health Breach Incident
For initial coverage, read this post. Updates: A threat actor, “Twister Canyon,” claims that MCG Health has made false claims about the incident. Their claims can be found in the Comments section under the original post. MCG Health was asked to respond to their claims but have not replied as of this June 14 posting….
Kennesaw State researchers highlight gaps in data security considerations for brainwave tech
Thomas Hartwell writes: Kennesaw State University researchers are urging a greater focus on cybersecurity in emerging brainwave technologies, which they say are vulnerable to hacking and breaches of personal data. Brainwave technologies can be used with a wired cap that feeds and decodes information straight into a computer, or wirelessly by wearing sensors on the…