Latest News Articles

IDStrong Weekly Cybersecurity Recap - Dec 31st

IDStrong Weekly Cybersecurity Recap - Dec 31st

The final week of the year has been quite stressful for everyday people as well as those who work in the cybersecurity field.

Aquatic Panda Exploit Targets American Universities

Aquatic Panda Exploit Targets American Universities

Aquatic Panda, an advanced persistent threat group, uses Log4Shell exploit tools to attack colleges and universities in the United States.

Shutterfly Attacked by Ransomware Hackers

Shutterfly Attacked by Ransomware Hackers

 Shutterfly, the popular picture-sharing website, has been hit by a ransomware attack.  The company has not revealed much about the attack but for the fact that it has disrupted its operations.

Cyber Attack Spurs Malicious Communications to Hellmann Customers

Cyber Attack Spurs Malicious Communications to Hellmann Customers

Hellmann Worldwide Logistics is warning customers that they might be the target of social engineering attacks. Hellmann, a logistics provider, was struck by a ransomware attack earlier in December.    

The Equation Hacking Group’s DanderSpritz Framework is Causing Problems

The Equation Hacking Group’s DanderSpritz Framework is Causing Problems

Digital security specialists are revealing the details of a malware framework dubbed DanderSpritz.  The Equation Group Hackers are responsible for this hack.

Ransomware Variants are on the Rise

Ransomware Variants are on the Rise

Ransomware hackers are rapidly progressing.   The digital thieves have advanced their attacks to include even more complex tactics for deploying malware on targeted systems.

Hackers Post Sensitive Police Data on the Dark Web

Hackers Post Sensitive Police Data on the Dark Web

Ransomware hackers have posted confidential police information on the shady corner of the internet known as the dark web.   The data was stolen from the United Kingdom police.

Backdoors Discovered Within Auerswald VoIP

Backdoors Discovered Within Auerswald VoIP

Digital security specialists have found hidden backdoors within Auerswald VoIP systems.   Made in Germany, these systems are intended to provide a secure means of engaging in voice calls.

Half a Million Android Users Hit by Joker Malware

Half a Million Android Users Hit by Joker Malware

More than 500,000 Android users are waking up to find their smartphone has a new form of malware. Dubbed Joker, the malware is transmitted in the form of an app through the Google Play Store.

More Than 35,000 Computers Infected by PseudoManuscrypt

More Than 35,000 Computers Infected by PseudoManuscrypt

PseudoManuscrypt has infiltrated a whopping 35,000+ computers in 2021. This malware botnet's name is a reference to Manuscrypt malware.

Cyber Security Recap – Dec 18th

Cyber Security Recap – Dec 18th

 Hackers are making their presence felt across the globe as we transition to the new year.   Sort through the latest digital security news, and you'll find a seemingly endless number of reports about spyware, malware, DDoS attacks, and other digital infiltrations.

Malware Without a File Bypasses Detection Through Windows Registry

Malware Without a File Bypasses Detection Through Windows Registry

A remote access Trojan based in JavaScipt avoids identification with a fileless approach.   The Trojan is implemented through social engineering.

Featured Articles

46,000 Veterans and 13 Community Care Providers Affected by a VA Data Breach

46,000 Veterans and 13 Community Care Providers Affected by a VA Data Breach

The Incident Early last week, the Department of Veteran Affairs (VA) was breached by an unknown cybercriminal exposing personal information for more than 46,000 veterans. Read More

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Instagram Vulnerability Allowed Hackers Access to Control Your Phone

Security experts Check Point Research discovered a critical vulnerability while examining Instagram's code that not only allows hackers full access to your Instagram account but also your mobile device.  Read More

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

Alien Malware Infects More than 226 Mobile Apps and Steals Bank Data

As reported on September 24, 2020, by ZDNet and ThreatPost, a new strain of malware named "Alien" is running rampant on the Android platform that has the power to steal passwords from more than 226 mobile apps! Read More

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems Hit by Ransomware Attack

Universal Health Systems (UHS), a Fortune 500 company owning more than 400 hospitals across the country, was hit by a ransomware attack this past weekend. Read More

Exchange Server Bug Exposes a Big Risk to Hackers

Exchange Server Bug Exposes a Big Risk to Hackers

Months after Microsoft released a patch to fix a serious flaw in MS Exchange Server, more than 61% of them are still vulnerable.  Read More

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Clients’ Bank Data Exposed in Blackbaud Ransomware Attack

Blackbaud software was victim to a ransomware attack last May, and new information suggests that clients may have lost more than just basic information.  Read More

Security Researchers Uncover Bugs in Antivirus Software Which Helps Hackers Get In

Security Researchers Uncover Bugs in Antivirus Software Which Helps Hackers Get In

According to research firm CyberARK, most popular anti-malware programs include bugs that allow hackers to increase their privileges on the system and take control.  Read More

Voter Registration Phishing Emails are on the Rise During the U.S. Presidential Election

Voter Registration Phishing Emails are on the Rise During the U.S. Presidential Election

During this highly contentious presidential election, hackers are working overtime phishing for social security numbers, driver's license numbers, dates of birth, and more. Read More

Free Identity Exposure Scan
Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close