Search This Blog

Latest News

Preserving Email Privacy: How to Block Hidden Read Receipts and Enhance Security

Disabling Read Receipts: Taking Control of Your Email Privacy In today's fast-paced tech-dominated world, the pressure to respond to ema...

All the recent news you need to know

New Information-Stealing Malware Campaign Targets Online Sellers

Online sellers have become the latest targets of a new information-stealing malware campaign that aims to compromise their sensitive data. Security researchers have discovered a strain of malware called Vidar being deployed in this campaign, with attackers using various methods to distribute the malicious software.

Vidar is a well-known information-stealing malware that has been active since at least 2018. It is designed to collect sensitive data from infected systems, including login credentials, financial information, and other personal details. The malware operates by monitoring the victim's activities and capturing keystrokes, taking screenshots, and even recording audio if necessary.

In this recent campaign, attackers have specifically focused on online sellers, recognizing the potential financial gain from stealing their login credentials and gaining unauthorized access to their e-commerce platforms. By compromising online seller accounts, attackers can manipulate product listings, redirect payments, and exploit customer data for fraudulent purposes.

The distribution methods employed in this campaign are diverse. They range from phishing emails containing malicious attachments or links to infected websites that host exploit kits. Once the malware is successfully installed on the victim's system, it remains silent and works stealthily in the background, gathering valuable information without the user's knowledge.

To protect against this type of threat, online sellers and individuals should implement robust cybersecurity practices. These include regularly updating operating systems and software to patch known vulnerabilities, employing strong and unique passwords for all online accounts, and being cautious when opening email attachments or clicking on suspicious links.

Furthermore, it is crucial to educate employees and individuals about the risks of phishing attacks and social engineering techniques commonly used by cybercriminals. By raising awareness and promoting a security-conscious mindset, organizations can significantly reduce the likelihood of falling victim to such malware campaigns.

Security solutions, including robust antivirus and anti-malware software, should be installed and kept up to date to detect and mitigate any potential threats. Regular system scans should also be conducted to identify and remove any malicious files or software.

The discovery of this new information-stealing malware campaign serves as a reminder that cybercriminals are continuously evolving their tactics and targeting specific industries for financial gain. Online sellers, in particular, should remain vigilant and implement strong security measures to safeguard their valuable data and protect their customers from fraud and identity theft.

Casepoint Investigates Alleged Breach After Hackers Claimed Theft of Government Data

US-based legal technology platform, Casepoint has apparently investigated a potential cybersecurity incident following claims of threat actors, who have hacked the platform claiming terabytes of sensitive data.

Casepoint offers legal advice for governmental organizations, businesses, and law firms in litigation, investigations, and compliance. The company has a number of well-known clients, including the U.S. Department of Defense (DoD), Marriott Hotels, the Securities and Exchange Commission (SEC), the U.S. Courts, and the Mayo Clinic.

Vishal Rajpara, the CTO and co-founder of Casepoint, released a statement in which he declined to confirm but otherwise did not seem to refute rumors that the ALPHV ransomware gang was responsible for the attack. BlackCat, the Russia-based ransomware gang claims to have stolen two terabytes of confidential data from Casepoint, which included data from the US government and “many other things you have tried so hard to keep,” the gang stated.

Some of the data stolen, according to TechCrunch, included private information from a Georgia-based hospital, a legal document, a state-sponsored ID and an internal document apparently issued by the FBI. However, the FBI is yet to confirm the allegations made by TechCrunch.

Following Casepoint’s acknowledgment of the investigation, ALPHV updated on the issue in a statement published on May 31. The firm also shared what seems to be the login details for the company’s software.

Rajpara published a statement on the issue, saying “Casepoint remains fully operational and have experienced no disruption to our services[…]the third-party forensic firm that we have engaged is currently running scans and deploying advanced endpoint detection monitoring tools and will be looking for signs of suspicious activity.” “We are early on in our investigation and are committed to keeping our clients informed as we learn more.”

However, Rajpara declined to comment on whether the business has technological resources to identify the data that was accessed or exfiltrated or whether it has been contacted by the ALPV ransomware organization with any communications, such as a ransom demand. 


The ALPHV gang has previously claimed to have attacked NextGen Healthcare, a U.S.-based maker of electronic health record software, and Ring, a video surveillance firm owned by Amazon. Despite the hackers' denials that they were connected to the gang, data obtained from Western Digital was also hosted on ALPHV's leak site.

Some other known victims of the ALPHV gang include Bandai Namco, Swissport, and the Munster Technological University in Ireland.  

UK Mental Health Charities Imparted Facebook Private Data for Targeted Ads


Some of the largest mental health support organisations in Britain gave Facebook information about private web browsing for its targeted advertising system. 

The data was delivered via a monitoring mechanism installed in the charities’ websites and includes details of URLs a user visited and buttons they clicked across content linked to depression, self-harm and eating disorders. 

Additionally, it included information about the times visitors saw pages to access online chat tools and when they clicked links that said "I need help" in order to request assistance. Some of the pages that caused data sharing with Facebook were particularly targeted towards youngsters, such as a page for 11 to 18-year-olds that provided guidance on how to deal with suicidal thoughts. 

Details of conversations between charities and users or messages sent via chat tools were not included in the data sent to Facebook during the Observer's analysis. All of the charities emphasised that they took service user privacy very seriously and that such messages were confidential.

However, it frequently involved browsing that most users would consider private, such as information about button clicks and page views on websites for the eating disorder charity Beat as well as the mental health charities Mind, Shout, and Rethink Mental Illness. 

The data was matched to IP addresses, which are typically used to identify a specific person or home, and, in many cases, specifics of their Facebook account ID. The tracking tool, known as Meta Pixel, has now been taken down from the majority of charity' websites. 

The information was discovered following an Observer investigation last week that exposed 20 NHS England trusts sharing data with Facebook for targeted advertising. This data included browsing activity across hundreds of websites related to particular medical conditions, appointments, medications, and referral requests.

Facebook says it makes explicit that businesses should not use Meta Pixel to gather or distribute sensitive data, such as information that could expose details about a person’s health or data belonging to children. It also says it has filters to weed out sensitive data it receives by mistake. However, prior research has indicated that they don't always work, and Facebook itself acknowledges that the system "doesn't catch everything".

The social media giant has been accused of doing too little to oversee what information it is being supplied, and faced questions over why it would allow some entities – such as hospitals or mental health organisations – to send it data in the first place.

Breaching Nature's Firewall: The Convergence of the Climate Change Crisis and Cyberattacks


Corporate strategies are being transformed by ESG considerations – which are now becoming a permanent feature of the economic services sector as they transform corporate strategies. A change in ESG practices cannot be brought about by internal or external pressures if stakeholders do not perceive that the changes can be financially beneficial. The evidence for this is unrefutable; the financial performance of companies that introduce sustainable principles is always strong over the long run if they implement sustainable practices. In addition to reducing costs, increasing productivity, and increasing demand, ESG and financial performance have some links. 

Climate change and cybercrime have similarities worth mentioning. Both groups pose increasing threats. These kinds of risks threaten the safety and security of our basic resources, such as water, energy, and infrastructure. 

It is possible that cyber-attacks and weather events, such as hurricanes, could have serious real-world consequences. ESG disclosure is becoming one of the most important factors for companies operating within the financial services industry. As the public's, investors, and the state's concerns grow, this is becoming an increasingly important issue. 

ESG-oriented regulations have increased considerably in the UK and globally as a result of the increasing number of regulations focusing on ESG. 

A company with ample resources and the ability to respond quickly to these unexpected challenges is more likely to be able to overcome them without being exposed to security risks. 

There will be an increase in cyber threats to their users as a result of this. Despite this, many companies need more resources and capacity to react appropriately and effectively to devastating weather events. This leaves weak spots in their defense system that can be exploited by hackers in case of disasters. 

There is an apparent link between these two threats – and cyber-security – that have enveloped our planet for years now. 

As a way of highlighting the connection between climate change and cybersecurity, Chloe Messdaghi, CEO and Founder, of Global Secure Partners, stated that climate change and cybersecurity are related to the same thing, but that connection is complex and multifaceted. Climate change is leading to greater cyber-threat opportunities. 

Societies rely on technology to combat and mitigate climate change. Technology plays a crucial role in improving resource management and sustainability efforts, from renewable energy systems to smart grids to connected devices. Although increasing dependence on technology is a good thing, it also brings new avenues to hack and get access to sensitive information. Cybercriminals have been able to gain entry into new areas through technological advancements, providing them with a wider attack surface from which to attack and exploit targets. If they succeed in their cyberattacks, there can be severe consequences for hackers who fail to penetrate renewable energy systems and smart grids, such as blackouts, disrupted services, and cascading effects on society.

Amongst the strongest indications that the green energy sector is growing, we can point to the occurrence of cyberattacks that are targeting it. Cybercriminals are becoming more and more interested in renewable energy systems as they become the backbone of economic operations in the future. The energy infrastructure is a critical component of society and the collapse of it could result in a blackout that would have catastrophic consequences.

It has become increasingly complex and interconnected for businesses to navigate an increasingly complex world in which they are confronted with two major challenges: cyber threats and global climate change. Breach of security may cause companies to suffer financial losses, damaging their reputations, and compromising customer information. 

There is a significant risk of operational disruption and supply chain issues arising from the effects of climate change, such as extreme weather events and a shortage of resources. For businesses to meet these challenges effectively, understanding the interplay between these challenges becomes imperative. This includes implementing resilience strategies to mitigate climate risks and cybersecurity policies to protect against evolving threats. Business continuity and sustainability can both be severely compromised in the event neither of these issues is addressed and they do not get resolved appropriately. 

There is no doubt that a cyberattack on the Colonial Pipeline in May 2021 represents a convergence between the climate change crisis and cyberattacks. This critical infrastructure was shut down, leading to panic buying, fuel shortages, and an increase in pollution emitted along the US East Coast. This was due to the shutdown of critical infrastructure. There was a severe cyber-attack on critical systems as a result of the incident, with climate change worsening the threat. 

A key point highlighted was that there was potential for data manipulation and the political ramifications that might result from upsetting an infrastructure that is essential to society. This example highlights the urgent need to develop integrated approaches to tackle the challenges posed by climate change as well as cyberattacks. 

Cyber security and climate change are both unaccountable, as is the lack of accountability for them. The problem of climate change is difficult to diagnose because everything plays a role, so it is extremely difficult to pinpoint who is responsible. 

Financial services face several challenges and opportunities related to climate change and cybersecurity. With climate catastrophes and their occurrences becoming more frequent and more severe, financial institutions must be prepared to deal with the associated risks, such as disruptions in their operations, supply chains, and investments, due to climate-related events. They must strengthen their cybersecurity defenses to protect sensitive data and protect themselves against all evolving cyber threats. 

It is possible to enhance resilience and risk assessment by embracing innovative technologies like AI and blockchain. For climate change to be mitigated and financial systems to be protected, collaboration between stakeholders is crucial. This includes incorporating climate risk into financial decision-making processes and fostering information sharing when developing robust strategies.