Europol Shuts Down a Franco-Israeli CEO Fraud Group

Europol put an end to the operations of a Franco-Israeli CEO fraud group. The threat actors used business email compromise (BEC) attacks to steal money. This led to €38,000,000 stolen in just a few days from one organization. Details About the Europol Investigation It took the collaboration between Europol, French, Croatian, Hungarian, Portuguese, and Spanish … Read more

Scandinavian Airlines Suffer Major Data Breach After Cyberattack

Scandinavian Airline SAS reported a cyber attack Tuesday evening and advised customers not to use its app, but later stated that the problem had been resolved. According to media reports, the hackers took down the carrier’s website and exposed customer information from its app. In addition, the cyberattack caused a malfunction in the airline’s online … Read more

FBI Investigates NYC Network Security Incident

The U.S. Federal Bureau of Investigation (FBI) is investigating potential cyber activity on their network. The agency stated that they have already contained the issue and are currently assessing the extent of the damage. The FBI has not released any additional details as the investigation is ongoing. The FBI is aware of the incident and … Read more

GoDaddy Discloses Data Breach Spanning Multiple Years

GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers stole source code and installed malware on its servers. While the attackers had access to the company’s network for a number of years, GoDaddy only learned about the security … Read more

What Is SSO? Single Sign-On Explained

Single Sign-On (SSO) is an authentication method that allows a user to securely authenticate with multiple applications and websites by using solely one set of login information (eg. username & password). In a nutshell, SSO simplifies the user authentication process. It happens when a user signs in to an app and is automatically authenticated with … Read more

What Are Deepfakes and How to Spot Them

In the age of technological advancement, it’s not just tech-savvy online bad actors that you have to watch out for – fake videos created using AI-driven software known as “deepfakes” are becoming increasingly hard to spot. In this article, we’ll look at what deepfakes are and how to spot them so you can protect yourself … Read more

Seven German Airports Hit by Suspected Cyber Attack

The ADV airport association reported that the websites of seven German airports were hit by a suspected cyber attack on Thursday. Düsseldorf, Nuremberg, and Dortmund airports were among those impacted, but the websites for Germany’s three busiest airports: Frankfurt, Munich, and Berlin—were all functioning normally. Once again, airports fell victim to large-scale DDoS attacks. (…) … Read more

CISA Warns About Four New Vulnerabilities Exploited as Zero-Days

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four new vulnerabilities, exploited as zero-day vulnerabilities, to its KEV (Known Exploited Vulnerabilities) catalog. The vulnerabilities affect Windows and iOS devices. New Vulnerabilities Discovered As also mentioned by BleepingComputer, two of the vulnerabilities that impact Microsoft products are CVE-2023-21823, which allows attackers to gain remote … Read more

Burton Snowboards’ Online Orders Canceled Due to a Cyberattack

The well-known snowboard manufacturer, Burton Snowboards, announced that a cyberattack targeted the organization. Due to what they called a “cyber incident”, the manufacturer canceled all online orders starting on 14 February 2023. What Do We Know Until Now Burton explained that they are currently investigating the incident to establish its full impact. The company employed … Read more