In a recent shocking revelation, the UK has witnessed its most substantial data breach to date. The **Electoral Commission**, an independent body set up by the UK Parliament, confirmed that “hostile actors” penetrated its protective digital barriers, allowing unauthorized access to its systems for a staggering 14 months. This extensive breach potentially means that the private details of nearly every UK voter registered between 2014 and 2022 have been exposed. The vast scope and duration of the unauthorized access have sent shockwaves throughout the cybersecurity community and the general public. The fact that malicious actors could remain undetected for over…
Author: ISBuzz Team
The recent cybersecurity breach at the Colorado Department of Higher Education (CDHE) underscores the ever-increasing need for robust digital safeguards, especially in the educational sector. This latest ransomware attack has not only placed CDHE in the spotlight but also impacted a vast majority of students and educators across Colorado. Quick Overview of the Breach Unfolding on June 19, 2023, CDHE unveiled the cyberattack through a data incident notification. Findings indicate unauthorized access to the department’s digital systems between June 11 and June 19. Critical data was at stake – from personal names and social security numbers to student IDs and…
In the digital era, even the world of sports isn’t immune to cybersecurity threats. A recent study titled “State of Play” conducted by Microsoft shed light on the amplified risks at major sporting events, highlighting a fertile ground for cybercriminals to exploit interconnected systems and networks. The 2022 FIFA World Cup in Qatar served as a prime example. Microsoft, responsible for overseeing the cybersecurity of the event’s critical infrastructure, witnessed relentless attempts by attackers to breach the integrated systems. They specifically exploited identity-based vulnerabilities. Justin Turner, Principal Group Manager at Microsoft Security Research, described the challenges faced, stating, “The unique…
In a rapidly digitalizing world, cyber threats continue to evolve, and recent disclosures from Microsoft have reinforced this concern. Microsoft Teams, a widely-used collaboration tool, has been targeted in a sophisticated phishing campaign by a hacker group with ties to the Russian government. The group, named ‘Midnight Blizzard’, has been engaged in a deceptive scheme, impersonating technical support representatives to breach user credentials. Methodology Behind the Attacks Midnight Blizzard, also known as Nobelium, has combined both traditional and innovative hacking techniques for this operation. They initiated the campaign by repurposing previously compromised Microsoft 365 accounts, primarily from small businesses. These…
In the ever-evolving landscape of cybersecurity threats, a new technique involving Google’s Accelerated Mobile Pages (AMP) is being increasingly used by cybercriminals for phishing attacks. As a widely respected and trusted platform, Google AMP has now unfortunately become a tool in the hands of these threat actors to bypass email security measures and sneak into the inboxes of unsuspecting enterprise employees. Google AMP is an open-source HTML framework co-created by Google and 30 partners aimed at speeding up the load times of web content on mobile devices. These pages are hosted directly on Google’s servers where the content is simplified…
Everlast, the renowned American boxing equipment brand, recently fell victim to a brazen cyberattack orchestrated by a cybergang associated with the world’s biggest online bank heist. The attackers infiltrated Everlast’s online shop, discreetly capturing credit card data during the checkout process. Shockingly, this vulnerability remains active as events continue to unfold. Investigation Exposes Sophisticated Attack Techniques, Magecart Group 4 Implicated The malware responsible for the breach was uncovered by security researcher Darius Povilaitis and further investigated by the Cybernews research team, led by Mantas Sasnauskas and Vincentas Baubonis. The attack comprises two steps, starting with the injection of code that…
Tempur Sealy, the global leader in bedding products, faces a severe cybersecurity crisis as a malicious cyberattack forces the company to take immediate action. The cyber intrusion commenced on July 23 and has significantly impacted Tempur Sealy’s operations, leading the company to enact crucial measures to contain the breach’s impact. In an effort to safeguard its digital assets and protect sensitive information, Tempur Sealy was compelled to shut down certain critical IT systems, resulting in a temporary disruption of its operations. Investigation Underway: Tempur Sealy Engages Cybersecurity Experts and Law Enforcement Upon detecting the cyberattack, Tempur Sealy responded promptly and…
New SEC Rules for Cyber Attack Disclosure The U.S. Securities and Exchange Commission (SEC) has approved new rules that mandate publicly traded companies to disclose details of a cyber attack within four days of identifying a “material” impact on their finances. This marks a significant shift in the disclosure of computer breaches, aligning cybersecurity with other critical investor information. Material Impact and Investor Protection “Whether a company loses a factory in a fire — or millions of files in a cybersecurity incident — it may be material to investors,” said SEC chair Gary Gensler. The new obligations require companies to…
New API Rules Unveiled In a bid to enhance user privacy, Apple has unveiled a significant modification to its App Store API regulations. From fall 2023 onwards, developers will be mandated to justify their utilization of certain APIs capable of gathering user data. This move is a part of Apple’s continuous efforts to deter the exploitation of APIs for user fingerprinting. Decoding User Fingerprinting User fingerprinting, alternatively known as device fingerprinting, is a method that amasses information about a user’s device to generate a unique identifier or “fingerprint”. This fingerprint consists of a set of features and attributes that can…
Security researchers from Midnight Blue, a Netherlands-based security firm, have discovered five vulnerabilities in the Terrestrial Trunked Radio (TETRA) communication systems. These systems are extensively used by government agencies, law enforcement, and emergency services organizations across Europe, the United Kingdom, and many other countries. The TETRA:BURST Vulnerabilities The vulnerabilities, collectively referred to as TETRA:BURST, affect all TETRA radio networks. They could potentially allow an attacker to decrypt communications in real-time or after the fact, inject messages, deanonymize users, or set the session key to zero for uplink interception. Critical Vulnerabilities: Decryption and Backdoor Access Two of these vulnerabilities are considered…