Edition-42
Updated Date: February 02 , 2022
Welcome to the Threatsploit Report of February 2022 covering some of the groundbreaking cybersecurity events, incidents, and exploits that occurred this month. This month, the cybersecurity sector witnessed a steep rise in ransomware, data breach, and sovereign attacks. Besides, many other attack types have seen a spike during the first month of the year.
“Employees and stakeholders have limited or no perception of massive cyber threats or consequences. It is our job to educate them.”
Log4j and its Vulnerability are continued to be discovered across the spectrum leading to system compromise around the globe. Personal detail compromise of a huge scale was highlighted when an Attorney General flagged a cyber-attack on small businesses. Even non-governmental organizations are facing the loss of sensitive data, i.e., the Red cross got hacked for high profile user database. System compromise by ransomware groups is on the rise, possibly leading to the closure of businesses across the geography. An active spying attack has been uncovered on cloud services like Google Drive which will lead to data compromises for sure. Another example of data compromise is for WordPress users. They may have the bad news as hackers have planted backdoors in a dozen WordPress plugins. Technology has been the most compromised domain followed by the Service sector this month. Let us walk you through some of the important security incidents that happened this month that may affect you or your partners, colleagues, family & friends.
Welcome to the November edition of the Threatsploit Adversary Report, your essential monthly resource for understanding the ever-evolving landscape of cyber threats worldwide.
Welcome to the October 2024 edition of the Threatsploit Adversary Report, where we shine a spotlight on the alarming rise of cyber threats impacting industries across the globe. This month,our focus turns to a notable cyberattack and supply chain compromise in pager devices inLebanon, illustrating the intricate geopolitical factors that contribute to digital exploitation in today’s interconnected world.
Our latest report highlights some significant cybersecurity incidents and vulnerabilities that have come to light recently. One of the notable threats is the Sitting Ducks attack.