Cloud Consultancy News
Attackers bypass Coinbase and MetaMask 2FA via TeamViewer, fake support chat
A crypto-stealing phishing campaign is underway to bypass multi-factor authentication and gain access to accounts on Coinbase, MetaMask, Crypto.com, and KuCoin and steal cryptocurrency. The threat actors abuse the Microsoft Azure Web Apps service to host a network of...
Microsoft Warns of Hackers Using Google Ads to Distribute Royal Ransomware
A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including the recently discovered Royal ransomware. Microsoft, which spotted the updated malware delivery method in late...
Shining a light on the dark web
Dark web marketplaces sell a plethora of tools, stolen data, and forged documents, and some of the things for sale are priced higher than the rest. The most expensive records advertised If we only focus on financial, identification and access data, the black market...
Suffolk police publish victims information in mass data breach
An investigation has been launched after Suffolk police accidentally published the names and addresses of victims of sexual assault on its website. Information published on the constabulary's website is believed to have contained victims' names, addresses, dates of...
UK Shoppers Lost £15m+ to Scammers Last Winter
Online shoppers lost an average of £1000 each last year over the busy Christmas shopping period, according to new figures, prompting experts to urge greater caution over the coming three months. The figures cited by the National Cyber Security Centre (NCSC) on...
Australia’s Medibank won’t pay the ransom for data stolen in breach
Australian health insurance provider Medibank has announced it won’t be paying the ransom to the criminal(s) who stole data of 9.7 million of its current and former customers. “Based on the extensive advice we have received from cybercrime experts we believe there is...
Cyber Attack on HaveIBeenPwned leaks email data to hackers
HaveIBeenPwned serves as a platform for those who can search for their email address to find whether it was accessed by hackers via a data breach. But what if the platform itself gets infiltrated and leaks the whole of its database to cyber crooks? Well, unconfirmed...
The Lockbit 3.0 ransomware gang started leaking the information allegedly stolen from the global high-tech company Thales
Thales is a global high-tech leader with more than 81,000 employees worldwide. The Group invests in digital and deep tech innovations – big data, artificial intelligence, connectivity, cybersecurity and quantum – to build a future of trust, essential to the...
Microsoft hit with fresh anti-competition claims over new cloud licences
A European cloud infrastructure group has filed a formal competition complaint against Microsoft with the European Commission, in what it claims is an effort to protect vendors and customers from Microsoft’s alleged unfair software licensing practises. The Cloud...
How to use the back of your iPhone as a camera button in iOS 16
Back Tap is an iOS feature that lets you trigger commands or run Shortcuts just by tapping on the back of your iPhone. Here's what you should know. Back Tap is an Accessibility feature in iOS 16 — first introduced back iOS 14 — that allows you to map commands or...