Banks in Singapore to phase out one-time passwords in 3 months
The Monetary Authority of Singapore (MAS) has mandated major retail banks in Singapore to phase out the use of one-time passwords (OTPs) within the next three months to combat phishing and scams. OTPs have been targeted by scammers and malware, prompting the transition to digital tokens for authentication. Customers are encouraged to activate digital tokens for improved security against cyber threats.
Pharmacy Giant Rite Aid Hit By Ransomware
Rite Aid recently experienced a ransomware attack, with the group RansomHub claiming responsibility and threatening to leak 10GB of customer data. The pharmacy chain has restored its systems with the help of cybersecurity experts and is fully operational. RansomHub, a known cybercriminal group, has targeted other high-profile organizations in the past, using social engineering tactics to gain access to sensitive information.
AT&T Pays Threat Actor $370,000 to Delete Stolen Data
AT&T paid $370,000 to hackers to delete stolen data affecting nearly all its customers, with the transaction confirmed via a blockchain tracking tool. The hacker provided video evidence of the data deletion, facilitated through a mediator known as Reddington, linked to the hacking group ShinyHunters. This incident highlights the risks associated with insecure Snowflake accounts, previously exploited in breaches of other companies like Ticketmaster and Santander.
Disney‘s Internal Slack Containing Unreleased Projects Leaked
Hacktivist group NullBulge claims to have stolen over one terabyte of data from Disney’s internal Slack channels, containing messages, files, and unreleased projects from 10,000 channels. The group alleges the breach was facilitated by an insider, though they were eventually cut off before acquiring more data. This breach, if confirmed, poses significant risks by potentially exposing sensitive information, making Disney vulnerable to further cyber attacks and exploitation.
Data of Millions of mSpy Customers Leaked Online
A major data breach at the spyware company mSpy has led to the exposure of over 300 gigabytes of sensitive customer information, including 2.4 million unique email addresses. The breach, which originated from mSpy’s Zendesk customer support platform, compromised personal documents, location data, and customer support tickets. This incident marks mSpy’s third known breach, highlighting significant vulnerabilities in handling and securing user data.
AT&T Breach May Also Impact Millions of Boost, Cricket, H2O Customers
AT&T suffered a major data breach via a third-party cloud platform, exposing phone numbers and metadata of nearly all AT&T wireless customers and customers of other wireless providers like Boost Mobile, Cricket Wireless, and H2O. The breach, involving the Snowflake platform, allowed hackers to access records of calls and texts, posing a risk of highly targeted social engineering attacks and identity theft. While sensitive data has not appeared on the public web yet, the stolen metadata could be used for sophisticated phishing attempts and other malicious activities in the future.
WP Time Capsule Plugin Update Urged After Critical Security Flaw
Security researchers discovered a vulnerability in the Backup and Staging by WP Time Capsule plugin, affecting versions 1.22.20 and below, which could allow unauthorized users to gain administrative access to affected sites. The flaw stemmed from a logical error in the plugin’s code, enabling attackers to exploit a broken authentication mechanism. The developers swiftly responded by releasing version 1.22.21 with a more robust security fix, emphasizing the importance of applying proper security protocols in plugin development.
Kaspersky is Shutting Down its Business in the United States
Kaspersky Lab, a Russian cybersecurity company, is shutting down its operations in the United States starting July 20, affecting less than 50 U.S.-based employees. This decision follows sanctions imposed by the U.S. Treasury Department and the Department of Commerce, citing national security risks due to the company’s ties to the Russian government. The company will wind down its U.S. operations by 2024, as the Biden administration’s actions have made their business in the U.S. no longer viable.
Disclaimer: Titles and summaries are AI-generated. Please refer to the linked content for more details.