{"id":8816,"date":"2024-07-16T15:56:28","date_gmt":"2024-07-16T12:56:28","guid":{"rendered":"https:\/\/cyberone.bg\/?p=8816"},"modified":"2024-07-17T09:30:13","modified_gmt":"2024-07-17T06:30:13","slug":"weekly-cybersecurity-report-week-28-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-28-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 28, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 28, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">1 &#8211; The cyber team of the Houthis: A study by the Lookout company claims that the Houthis have distributed Android malware through which they steal information from victims in the Middle East.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The malicious GuardZoo was distributed through WhatsApp and various websites and has so far affected about 450 devices located in the Middle East (Yemen, Egypt, Saudi Arabia, Qatar, Turkey and Oman).<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">2 &#8211; Fujitsu confirms customer data exposed in the cyber-attack in March<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Fujitsu confirms that information related to some customers&#8217; people and businesses was compromised during the data breach detected earlier this year.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Japanese technology giant states that the attack did not include ransomware but relied on a sophisticated mechanism to evade detection while filtering data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">3 &#8211; 1.4 GB of NSA information leaked online &#8211; email addresses, phone numbers and classified government data exposed<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">After reporting a massive X(Twitter) database leak today, researchers at Cyber \u200b\u200bPress have discovered another sensitive data leak on a well-known hacking forum that contains 1.4 GB of classified National Security Agency (NSA) data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The threat actors claim that the data was allegedly obtained from a data breach of Acuity Inc., a company that works closely with the United States government and its allies.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This breach raises serious national security concerns and highlights weaknesses in government contractors&#8217; cyber security measures.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The data breach forum user named &#8220;Gostingr&#8221; uploaded the classified file to the data breach forum on July 9, 2024, intending to release this large NSA database.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cyberpress.org\/1-4-gb-nsa-data-leaked-online\/?amp=1\"><span data-contrast=\"none\">https:\/\/cyberpress.org\/1-4-gb-nsa-data-leaked-online\/?amp=1<\/span><\/a><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">4 &#8211; Hackers leak 170,000 barcodes of Taylor Swift&#8217;s ERAS Tour<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">A threat actor with the alias Sp1d3rHunters has leaked 170,000 valid barcodes for Taylor Swift&#8217;s ERAS tour for free. The barcodes are valid for Taylor Swift&#8217;s upcoming concerts in Miami, New Orleans and Indianapolis.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The threat actor demanded a $2 million ransom from Ticketmaster to avoid leaking an additional 30 million event barcodes and information on 680 million users.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">5 &#8211; Threat actor Sp1d3rHunters plans to release tickets to concerts and other events of other celebrities, including tickets to P!nk and Sting concerts, and sporting events (F1 Formula Racing, MLB and NFL).<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Next week the threat actor will leak data related to another celebrity&#8217;s events.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">6 &#8211; Health services company HealthEquity warns that it is suffering a data breach after a partner&#8217;s account was compromised and used to access the company&#8217;s systems to steal protected health information.<\/span><\/b><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The company claims that it detected the incident after detecting &#8216;abnormal behavior&#8217; from the partner&#8217;s personal device and began investigating the incident.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The investigation revealed that the partner was compromised by hackers who leveraged the hijacked account to gain unauthorized access to HealthEquity&#8217;s systems and, subsequently, access sensitive health data.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right protection. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 28, 2024 Information security updates and events from the past week\u00a0 1 &#8211; The cyber team of the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8450,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-8816","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=8816"}],"version-history":[{"count":4,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816\/revisions"}],"predecessor-version":[{"id":8819,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/8816\/revisions\/8819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8450"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=8816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=8816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=8816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}