,

This Week in Cybersecurity: 08th Jan – 12th Jan – SEC X Account Hack Creates Chaos

This Week in Cybersecurity: 08th Jan - 12th Jan - SEC X Account Hack Creates Chaos
Table of Contents
    Add a header to begin generating the table of contents

    US SEC X Account Hacked, Hackers Post Fake Bitcoin ETF Approval Tweet

    The U.S. Securities and Exchange Commission’s X account experienced a security breach. As a result, a false Bitcoin ETF Approval Tweet was issued through a tweet from the compromised account. With the SEC X account hacked, and the false Bitcoin ETF approval tweet, Bitcoin saw a short-lived spike when the SEC confirmed the hack. Read more

    LockBit Ransomware Claims Capital Health Attack, Threatens to Leak Sensitive Data

    The LockBit ransomware group has acknowledged their involvement in the Capital Health attack that took place in November 2023. The adversaries are now issuing a warning, stating their intention to release the stolen data and negotiation chats. Read more

    Ivanti Critical EPM Bug Allows Hackers to Hijack EPM Devices

    Ivanti has successfully addressed a critical remote code execution (RCE) vulnerability in its Endpoint Management software (EPM). The Ivanti critical EPM bug had the potential to allow unauthorized individuals to take control of enrolled devices or the core server. Read more

    Ukrainian Hacker Group Takes Down Moscow ISP as a Revenge for Kyivstar Cyber Attack

    A Ukrainian hacker group, believed to be connected to Ukraine’s intelligence took and carried out a destructive attack on the servers of a Moscow-based internet provider to take revenge for Kyivstar cyberattack. Read more

    Hackers Can Now Access Your Google Accounts Without Password

    Security researchers have recently discovered a sophisticated hacking technique that enables cyber criminals to gain unauthorized entry into individuals’ Google accounts without passwords. Read more

    Trending

    Daily Briefing Newsletter

    Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

    Related Posts