Researchers at Cyble discovered over 8,000 exposed VNC (virtual network computing) endpoints that allow access to networks without authentication. VNC is a graphical desktop-sharing system that allows control of another machine remotely. It mirrors graphical screen changes as well as keyboard and mouse inputs from one machine to another. Many of the exposed VNC’s found belonged to industrial control systems that should never be exposed. “the exposed VNCs found during the time of analysis belong to various organizations that come under Critical Infrastructures such as water treatment plants, manufacturing plants, research facilities, etc. During the course of the investigation, researchers were able to narrow down…
Author: ISBuzz Team
A new study by BlackBerry and Corvus Insurance confirms a “cyber insurance gap” is growing, with a majority of businesses in North America either uninsured or underinsured against a rising tide of ransomware attacks and other cyber threats. Only 19% of all businesses surveyed have ransomware coverage limits above the median ransomware demand amount ($600,000)Among SMBs with fewer than 1,500 employees, only 14% have a coverage limit in excess of $600,00037% of respondents with cyber insurance do not have any coverage for ransomware payment demands43% of those with a policy are not covered for auxiliary costs such as court fees…
In response to reports that hackers are increasingly moving towards hybrid forms of phishing attacks that combine email and voice social engineering calls, with the use of ‘hybrid vishing’ is seeing a massive 625% growth in 2022, an expert at cybersecurity firm offers the following comment.
In response to reports that Argentina’s Judiciary of Córdoba has shut down its IT systems after suffering a ransomware attack at the hands. of the new ‘Play’ ransomware operation, cyber security experts reacted below.
It has been reported that South Staffordshire Water “has been the target of a criminal cyber attack”, the company has confirmed. In a statement, it stressed it was “still supplying safe water to all of our Cambridge Water and South Staffs Water customers”. Cl0p Ransomware Organization Has Claimed Responsibility Although South Staffordshire Water withheld information about the breach’s nature, the Cl0p ransomware organization has claimed responsibility. I guess, sort of. The attackers in this case made a critical error: they failed to remember which organization they broke into. The extortionists claimed they had violated Thames Water in an internet posting made just before South Staffordshire…
Talos Intelligence Group confirmed that Cisco had been hacked by the Yanluowang ransomware group. The confirmation in a Talos blog posting, stated Cisco first learned of the compromise on May 24. Excerpts follow: On May 24, 2022, Cisco became aware of a potential compromise. Since that point, Cisco Security Incident Response (CSIRT) and Cisco Talos have been working to remediate.… it was determined that a Cisco employee’s credentials were compromised after an attacker gained control of a personal Google account where credentials saved in the victim’s browser were being synchronized.The attacker conducted a series of sophisticated voice phishing attacks under the guise…
Following news that a cyber-attack on a major IT provider of the NHS, Advanced, has been confirmed as a ransomware attack (NHS IT supplier held to ransom by hackers – BBC News), Information Security Experts explains further about attacks on healthcare providers.
As reported by The Verge, Zoom has issued a patch for a bug on macOS that could allow a hacker to take control of a user’s operating system (via MacRumors). In an update on its security bulletin, Zoom acknowledges the issue (CVE-2022-28756) and says a fix is included in version 5.11.5 of the app on Mac, which you can (and should) download now.
According to Bolton News, unsuspecting parents are being targeted by scammers in a re-emerging phishing scam that has seen victims lose thousands. A warning has been issued for the new ‘Hi Mum’ scam which sees fraudsters pose as a son or daughter asking for money to replace a lost phone, or because of a financial emergency. The scam messages work by convincing parents into thinking their child has a new number and to delete the old one. What soon follows is the scammer asking for help and encouraging for the money to be sent over, leaving the parent out of…
Cisco has admitted that its corporate network was compromised and the company suffered a data exfiltration due to a compromised employee’s account.