{"id":8816,"date":"2024-07-16T15:56:28","date_gmt":"2024-07-16T12:56:28","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8816"},"modified":"2024-07-17T09:30:13","modified_gmt":"2024-07-17T06:30:13","slug":"weekly-cybersecurity-report-week-28-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-28-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 28, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 28, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1 \u2013 The cyber team of the Houthis: A study by the Lookout company claims that the Houthis have distributed Android malware through which they steal information from victims in the Middle East.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The malicious GuardZoo was distributed through WhatsApp and various websites and has so far affected about 450 devices located in the Middle East (Yemen, Egypt, Saudi Arabia, Qatar, Turkey and Oman).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2 \u2013 Fujitsu confirms customer data exposed in the cyber-attack in March<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fujitsu confirms that information related to some customers\u2019 people and businesses was compromised during the data breach detected earlier this year.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Japanese technology giant states that the attack did not include ransomware but relied on a sophisticated mechanism to evade detection while filtering data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3 \u2013 1.4 GB of NSA information leaked online \u2013 email addresses, phone numbers and classified government data exposed<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After reporting a massive X(Twitter) database leak today, researchers at Cyber \u200b\u200bPress have discovered another sensitive data leak on a well-known hacking forum that contains 1.4 GB of classified National Security Agency (NSA) data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The threat actors claim that the data was allegedly obtained from a data breach of Acuity Inc., a company that works closely with the United States government and its allies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This breach raises serious national security concerns and highlights weaknesses in government contractors\u2019 cyber security measures.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The data breach forum user named \u201cGostingr\u201d uploaded the classified file to the data breach forum on July 9, 2024, intending to release this large NSA database.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cyberpress.org\/1-4-gb-nsa-data-leaked-online\/?amp=1\"><span data-contrast=\"none\">https:\/\/cyberpress.org\/1-4-gb-nsa-data-leaked-online\/?amp=1<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4 \u2013 Hackers leak 170,000 barcodes of Taylor Swift\u2019s ERAS Tour<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A threat actor with the alias Sp1d3rHunters has leaked 170,000 valid barcodes for Taylor Swift\u2019s ERAS tour for free. The barcodes are valid for Taylor Swift\u2019s upcoming concerts in Miami, New Orleans and Indianapolis.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The threat actor demanded a $2 million ransom from Ticketmaster to avoid leaking an additional 30 million event barcodes and information on 680 million users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">5 \u2013 Threat actor Sp1d3rHunters plans to release tickets to concerts and other events of other celebrities, including tickets to P!nk and Sting concerts, and sporting events (F1 Formula Racing, MLB and NFL).<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Next week the threat actor will leak data related to another celebrity\u2019s events.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">6 \u2013 Health services company HealthEquity warns that it is suffering a data breach after a partner\u2019s account was compromised and used to access the company\u2019s systems to steal protected health information.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company claims that it detected the incident after detecting \u2018abnormal behavior\u2019 from the partner\u2019s personal device and began investigating the incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The investigation revealed that the partner was compromised by hackers who leveraged the hijacked account to gain unauthorized access to HealthEquity\u2019s systems and, subsequently, access sensitive health data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong><em>The attacks highlighted in this report aren\u2019t just incidents, they\u2019re blueprints of the adversary\u2019s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 28, 2024 Information security updates and events from the past week\u00a0 1 \u2013 The cyber team of the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-8816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8816"}],"version-history":[{"count":4,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816\/revisions"}],"predecessor-version":[{"id":8819,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816\/revisions\/8819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8450"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}