Remove tag cyberattacks
article thumbnail

Burger King forgets to put a password on their systems, again

Security Affairs

In the hands of malicious actors, the leaked credentials could have served as a tool to craft a cyberattack against the chain’s systems. Another piece of sensitive information that the research team observed included a Google Tag Manager ID. Then they’d be able to execute arbitrary JavaScript code on the website.

article thumbnail

Mar 27 – Apr 02 Ukraine – Russia the silent cyber conflict

Security Affairs

Mar 31 – Google TAG details cyber activity with regard to the invasion of Ukraine. The Google TAG uses uncovered phishing attacks targeting Eastern European and NATO countries, including Ukraine. Ukrtelecom, a major Ukrainian mobile service and internet provider, foiled a “massive” cyberattack that hit its infrastructure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Sure steps to achieve a robust employee cybersecurity awareness training regimen

The Last Watchdog

Provide frequent training about the risks of cyberattacks. One of the best ways to increase employee security awareness is to provide frequent training and communication about the risks of phishing and other cyberattacks. Make sure to use common, understandable labels and data value tags for your data. Use a corporate VPN.

article thumbnail

Indian power generation giant Tata Power hit by a cyber attack

Security Affairs

Tata Power Company Limited, India’s largest power generation company, announced it was hit by a cyberattack. The security firm is tracking this cluster of malicious activities under the moniker Threat Activity Group 38 aka TAG-38. Tata Power on Friday announced that was hit by a cyber attack.

Access 131
article thumbnail

Bumblebee attacks, from initial access to the compromise of Active Directory Services

Security Affairs

The Cybereason Global Security Operations Center (GSOC) Team analyzed a cyberattack that involved the Bumblebee Loader and detailed how the attackers were able to compromise the entire network. Threat actors are using the Bumblebee loader to compromise Active Directory services as part of post-exploitation activities.

Access 115
article thumbnail

Security Affairs newsletter Round 455 by Pierluigi Paganini – INTERNATIONAL EDITION

Security Affairs

CISA warns of actively exploited Ivanti EPMM flaw CVE-2023-35082 The Quantum Computing Cryptopocalypse – I’ll Know It When I See It Kansas State University suffered a serious cybersecurity incident CISA adds Chrome and Citrix NetScaler to its Known Exploited Vulnerabilities catalog Google TAG warns that Russian COLDRIVER APT is using a custom backdoor (..)

Security 109
article thumbnail

Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies

Security Affairs

Hostile hacking groups are exploiting Russia’s invasion of Ukraine to carry out cyberattacks designed to steal login credentials, sensitive information, money and more from victims around the world. Security Affairs is one of the finalists for the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS.