Cyber Attack news headlines trending on Google

The festive season of Christmas 2023 has unfortunately become a prime time for cyber-criminals to unleash a wave of cyber attacks, with incidents occurring globally every two hours.
Reports from Iran's state media indicate that nearly 70% of fuel stations, along with a couple of steel factories, a rail network, and a technology company, fell victim to these digital assailants opposed to the activities of the Islamic Republic.
Jawed Owli, the Minister for Oil, has warned that the intensity of these attacks may escalate as the year 2023 draws to a close.
Adding to the cybersecurity concerns, VF Corp, a major American retail giant specializing in apparel and footwear, has fallen prey to a cyber breach.
With subsidiaries like The North Face and Vans gearing up for the annual Christmas rush, a digital assault at this critical juncture could have detrimental effects on the company's current and future business plans.
While VF Corp has not explicitly labeled the incident as a ransomware attack, it admitted in its latest filing to the SEC that a significant portion of data on its servers was encrypted, and the attackers were demanding a substantial ransom.
In a separate incident, Washington County issued a press statement revealing that state-funded hackers attempted to breach its systems last Sunday.
The county's IT staff successfully thwarted all 64,000 attempts by the criminals to steal email IDs and sensitive data, ensuring the security of the county's digital information.
Xfinity, formerly known as Comcast Cable Communication LLC, has raised alarm bells by disclosing a potential compromise of some of its systems between October 16th and 19th of this year.
The hackers may have gained unauthorized access to critical details such as usernames, passwords, and contact information.
According to the company's press release, the breach occurred through a security vulnerability in Citrix systems, potentially allowing the hackers access to usernames and encrypted passwords, which could be decrypted using open-source software.
Customers are strongly advised to change their passwords, and law enforcement authorities are actively investigating the extent of the impact.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Tue, 19 Dec 2023 06:28:05 +0000


Cyber News related to Cyber Attack news headlines trending on Google

Google Cloud Next 2024: New Data Center Chip Joins Ecosystem - Google Cloud announced a new enterprise subscription for Chrome and a bevy of generative AI add-ons for Google Workspace during the Cloud Next '24 conference, held in Las Vegas from April 9 - 11. Overall, Google Cloud is putting its Gemini generative ...
1 year ago Techrepublic.com
The Rise of Cyber Insurance - What CISOs Need to Consider - Cyber insurance offers not just financial protection against potentially devastating cyber incidents but also provides frameworks for improving security posture, access to specialized resources, and support during crisis scenarios. Beyond financial ...
6 months ago Cybersecuritynews.com
Cyber Insurance for Businesses: Navigating Coverage - To mitigate these risks, many businesses opt for cyber insurance. With the wide range of policies available, navigating the world of cyber insurance can be overwhelming. In this article, we will delve into the complexities of cyber insurance and ...
1 year ago Securityzap.com
Cyber Insurance: A Smart Investment to Protect Your Business from Cyber Threats in 2023 - Don't wait until it's too late - get cyber insurance today and secure your business for tomorrow. According to the U.S. Federal Trade Commission, cyber insurance is a particular type of insurance that helps businesses mitigate financial losses ...
1 year ago Cyberdefensemagazine.com
Hackers Abuse Google Services to Send Malicious Law Enforcement Requests - The attack utilizes official Google infrastructure, including the company’s OAuth system and sites.google.com domain, to create messages that appear to come directly from Google’s trusted [email protected] address. A sophisticated ...
5 months ago Cybersecuritynews.com
Fighting ransomware: A guide to getting the right cybersecurity insurance - While the cybersecurity risk insurance market has been around for more than 20 years, the rapidly changing nature of attacks and the rise in the ransomware epidemic has markedly changed the nature of cyber insurance in recent years. It's more ...
1 year ago Scmagazine.com
Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams - Cybersecurity researchers have identified a sophisticated international fraud campaign that leverages impersonated news websites from major outlets including CNN, BBC, CNBC, News24, and ABC News to orchestrate large-scale investment scams. The ...
3 months ago Cybersecuritynews.com
Ahead of Regulatory Wave: Google's Pivotal Announcement for EU Users - Users in the European Union will be able to prevent Google services from sharing their data across different services if they do not wish to share their data. Google and five other large technology companies must comply with the EU's Digital Markets ...
1 year ago Cysecurity.news
Wargames director Jackie Schneider on why cyber is one of 'the most interesting scholarly puzzles' - In other games, we had people from Silicon Valley who were leading AI companies or cyber companies. What we found is those who had expertise in cyber operations were more likely to be more nuanced about how they used the cyber capability. On a larger ...
1 year ago Therecord.media
Three Key Threats Fueling the Future of Cyber Attacks - Improvements in cyber security and business continuity are helping to combat encryption-based ransomware attacks, yet the cyber threat landscape is continually evolving. Protecting an organization against intrusion remains a cat and mouse game, in ...
1 year ago Cyberdefensemagazine.com
What CIRCIA Means for Critical Infrastructure Providers and How Breach and Attack Simulation Can Help - Cyber Defense Magazine - To prepare themselves for future attacks, organizations can utilize BAS to simulate real-world attacks against their security ecosystem, recreating attack scenarios specific to their critical infrastructure sector and function within that sector, ...
1 year ago Cyberdefensemagazine.com Akira
Does Pentesting Actually Save You Money On Cyber Insurance Premiums? - Way back in the cyber dark ages of the early 1990s as many households were buying their first candy-colored Macintoshes and using them to play Oregon Trail and visit AOL chat rooms, many businesses started venturing into the digital realm as well by ...
1 year ago Securityboulevard.com Rocke
IT Professionals in ASEAN Confronting Rising Cyber Security Risks - The ASEAN region is seeing more cyber attacks as digitisation advances. In July 2023, the Association of Southeast Asian Nations officially opened a joint cyber security information sharing and research centre, or Cybersecurity and Information Centre ...
1 year ago Techrepublic.com
Hackers Weaponized Google Forms to Evade Email Security & Steal Logins - Cyber Security News - The platform’s reputation as a legitimate Google service means that links to these forms frequently bypass email security controls that would generally flag suspicious URLs. Security researchers have observed attackers utilizing the HTTP POST ...
6 months ago Cybersecuritynews.com
Uncertainty Is the Biggest Challenge to Australia's Cyber Security Strategy - Political shifts could lead to changes in Australia's cyber security strategy. Early in 2023, as the Australian government started to craft its cyber security vision, it met with opposition at both ends of the political spectrum. On the right wing, ...
1 year ago Techrepublic.com
Cyber Insights 2023: The Geopolitical Effect - The result is more than a dozen features on subjects ranging from AI, quantum encryption, and attack surface management to venture capital, regulations, and criminal gangs. The Russia/Ukraine war that started in early 2022 has been mirrored by a ...
2 years ago Securityweek.com
Hackers Exploiting Google's OAuth system Flaws to Bypass Gmail Security Filters - The attack, which successfully bypasses Gmail’s security filters, appears legitimate to users as it originates from authentic Google domains and passes all standard security checks, including DKIM authentication. Nick Johnson, Ethereum Name ...
6 months ago Cybersecuritynews.com
North Korea Launches New Military Based Research Center To Strengthen Hacking Capabilities - The center is designed to research and develop international cyber hacking technologies, representing a substantial shift in the country’s approach to information warfare. The establishment of Research Center 227 comes amid increasing ...
7 months ago Cybersecuritynews.com
Massive Android Ad Fraud 'IconAds' Leverages Google Play to Attack Phone Users - Cyber Security News - A sophisticated mobile ad fraud operation dubbed “IconAds” has infiltrated Android devices worldwide through 352 malicious applications distributed via Google Play Store, generating up to 1.2 billion fraudulent bid requests daily at its ...
4 months ago Cybersecuritynews.com
Google promises a rescue patch for Android 14's "ransomware" bug - So Android 14 has this pretty horrible storage bug for upgrading users. Bugs are always going to happen, but the big problem with this is that Google has seemingly been ignoring it, and on Friday we wrote about how users have been piling up hundreds ...
1 year ago Arstechnica.com
The top cyber security news stories of 2023 - 2023 was a busy year for cyber criminals, making it tough to choose the top cyber security news stories of 2023. Cyber security professionals have had their hands full in protecting sensitive information and detecting breaches to ensure the safety of ...
1 year ago Securityboulevard.com
Hackers Mimic Google Chrome Install Page on Google Play to Deploy Android Malware - Security researchers have uncovered a sophisticated malware campaign targeting Android users through fake Google Chrome installation pages. The visual similarity to legitimate Google Play pages creates a convincing illusion that tricks unsuspecting ...
7 months ago Cybersecuritynews.com OilRig APT3
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk - Google is disputing a security vendor's report this week about an apparent design weakness in Google Workspace that puts users at risk of data theft and other potential security issues. According to Hunters Security, a flaw in Google Workspace's ...
1 year ago Darkreading.com Hunters
Google Launches OSS Rebuild to Strengthen Security of The Open-Source Package Ecosystems - Cyber Security News - Google Security Blog analysts identified the malware’s tell-tale divergence between source and published bytecode after comparing upstream commits with registry payloads, underscoring the need for reproducible builds at scale. OSS Rebuild answers ...
3 months ago Cybersecuritynews.com
ACRStealer Malware Exploiting Google Docs as C2 To Steal Login Credentials - A newly identified malware variant dubbed ACRStealer has been observed leveraging Google Docs as a command-and-control (C2) server to bypass traditional security defenses and harvest sensitive login credentials. Enterprise security teams are advised ...
8 months ago Cybersecuritynews.com

Cyber Trends (last 7 days)