News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Cyberattack Rocks Polish Space Agency's Email Systems

The Polish Space Agency (POLSA) has confirmed it suffered a cyberattack that compromised its email systems, forcing it to shut down its IT infrastructure. The attack appears to be an email compromise, with insiders suggesting that relevant authorities have been notified and the agency is analyzing the situation. POLSA's machines were disconnected from the internet as part of the incident.

See Also

Poland's Space Agency Hit with Cyberattack Δ1.93

POLSA is investigating a suspected cyberattack that has disrupted its services. The Polish government agency responsible for the country's space activities had immediately disconnected its network from the internet after detecting the cyberattack on Sunday, but its website remains offline at present. POLSA is working to identify who was behind the attack and restore its services as soon as possible.

Cyberattack Detected at Polish Space Agency, Minister Says Δ1.90

Polish cybersecurity services have detected unauthorized access to the Polish Space Agency's (POLSA) IT infrastructure, Minister for Digitalisation Krzysztof Gawkowski said on Sunday. The incident has raised concerns about national security and the potential vulnerability of critical government systems. Authorities are working to identify the source of the attack and take corrective measures to prevent future breaches.

Zapier Data Breach Raises Concerns Over Customer Information Security. Δ1.75

Zapier, a popular automation tool, has suffered a cyberattack that resulted in the loss of sensitive customer information. The company's Head of Security sent a breach notification letter to affected customers, stating that an unnamed threat actor accessed some customer data "inadvertently copied to the repositories" for debugging purposes. Zapier assures that the incident was isolated and did not affect any databases, infrastructure, or production systems.

Polish PM Tusk Cautions 'Friends' Against Arrogance After Starlink Spat Δ1.74

Poland's prime minister has cautioned his allies against being arrogant in a post on X, following an extraordinary social media spat with top US and Polish officials over Starlink. The spat between Secretary of State Marco Rubio and Foreign Minister Radoslaw Sikorski raised concerns about the reliability of Elon Musk's satellite service for Ukraine. Poland pays $50 million per year for Ukraine to use Starlink, which provides crucial internet connectivity.

Poland Seeks Alternative to Starlink in Ukraine Amid Reliability Concerns Δ1.74

Poland is considering alternative internet service providers if Elon Musk's SpaceX proves unreliable, foreign minister Radoslaw Sikorski said. Starlink has been crucial for Ukraine's military and civilians amid the ongoing conflict with Russia. The Polish government pays $50 million annually for Ukraine's Starlink subscription, which it plans to maintain despite potential disruptions.

Musk and Rubio Spar with Polish Minister Over Ukraine's Use of Starlink Δ1.74

The exchange between US Secretary of State Marco Rubio, Elon Musk, and Poland's foreign minister Radoslaw Sikorski over the use of Starlink satellite internet system in Ukraine highlights the complexities of international relations, technological diplomacy, and the role of private companies in conflict zones. The situation underscores the fragility of global supply chains, particularly in the aerospace industry, where timely delivery of parts is crucial for meeting production goals. Musk's comments on Twitter have sparked concerns about the reliability of Starlink services in Ukraine, with some experts warning that disruptions could have significant consequences for the country's military operations.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.73

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

India's Angel One Says Assessing Impact After Security Breach Δ1.73

Indian stock broker Angel One has confirmed that some of its Amazon Web Services (AWS) resources were compromised, prompting the company to hire an external forensic partner to investigate the impact. The breach did not affect clients' securities, funds, and credentials, with all client accounts remaining secure. Angel One is taking proactive steps to secure its systems after being notified by a dark-web monitoring partner.

US Set to Pause Cyber-Offensive Operations Against Russia - but CISA Says It Won't Stop Δ1.73

Reports of a potential pause in cyber offensives against Russia have sparked concerns about the Trump administration's foreign policy shift. The move, if confirmed, would represent a significant change in the US approach to countering Russian aggression online. However, the US Cybersecurity and Infrastructure Security Agency (CISA) has denied any plans to stop monitoring threats from Russia.

Cyberattack on Ntt Reveals Weaknesses in Global Telecommunications Infrastructure Δ1.73

NTT Communications has suffered a devastating cyberattack that compromised sensitive data of almost 18,000 corporate customers. The breach occurred in late February and saw the theft of key customer information, including contract numbers, names, contact details, and service usage records. NTT has acknowledged the breach but remains tight-lipped about the identity of the attackers or how they accessed its systems.

ClickFix Attack Hijacks Microsoft SharePoint to Spread Havoc Malware Δ1.73

Security researchers spotted a new ClickFix campaign that has been abusing Microsoft SharePoint to distribute the Havoc post-exploitation framework. The attack chain starts with a phishing email, carrying a "restricted notice" as an .HTML attachment, which prompts the victim to update their DNS cache manually and then runs a script that downloads the Havoc framework as a DLL file. Cybercriminals are exploiting Microsoft tools to bypass email security and target victims with advanced red teaming and adversary simulation capabilities.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.73

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

US Said to Halt Offensive Cyber Operations Against Russia Δ1.73

The United States has reportedly ceased its offensive cyber operations against Russia as part of a strategic shift by the Trump administration to facilitate negotiations aimed at ending the war in Ukraine. This decision, authorized by Defense Secretary Pete Hegseth, marks a significant change in the U.S. government's approach to perceived cyber threats from Russia, despite earlier assessments labeling Russia as an enduring cyber threat. The halt in operations, which does not extend to espionage efforts by the NSA, reflects broader tensions regarding cybersecurity priorities and the administration's evolving threat assessment.

AWS Misconfigurations Reportedly Used to Launch Phishing Attacks Δ1.73

Threat actors are exploiting misconfigured Amazon Web Services (AWS) environments to bypass email security and launch phishing campaigns that land in people's inboxes. Cybersecurity researchers have identified a group using this tactic, known as JavaGhost, which has been active since 2019 and has evolved its tactics to evade detection. The attackers use AWS access keys to gain initial access to the environment and set up temporary accounts to send phishing emails that bypass email protections.

Lee Enterprises Ransomware Attack Hits Freelance and Contractor Payments Δ1.73

The Lee Enterprises ransomware attack is affecting the company's ability to pay outside vendors, including freelancers and contractors, as a result of the cyberattack that began on February 3. The attack has resulted in widescale outages and ongoing disruption at dozens of newspapers across the United States, causing delays to print editions and impacting various aspects of the company's operations. Lee Enterprises has confirmed that hackers "encrypted critical applications," including those related to vendor payments.

US Said to Halt Offensive Cyber Operations Against Russia Δ1.73

The United States has suspended its offensive cyber operations against Russia, according to reports, amid efforts by the Trump administration to grant Moscow concessions to end the war in Ukraine. The reported order to halt U.S.-launched hacking operations against Russia was authorized by U.S. Defense Secretary Pete Hegseth. The new guidance affects operations carried out by U.S. Cyber Command, a division of the Department of Defense focused on hacking and operations in cyberspace.

Europol Arrests Online Network Users for Sharing Ai Csam Δ1.73

Europol has arrested 25 individuals involved in an online network sharing AI-generated child sexual abuse material (CSAM), as part of a coordinated crackdown across 19 countries lacking clear guidelines. The European Union is currently considering a proposed rule to help law enforcement tackle this new situation, which Europol believes requires developing new investigative methods and tools. The agency plans to continue arresting those found producing, sharing, and distributing AI CSAM while launching an online campaign to raise awareness about the consequences of using AI for illegal purposes.

Advanced Cyber Threats on Network Devices Worry Global Internet Security Δ1.72

Sophisticated, advanced threats have been found lurking in the depths of the internet, compromising Cisco, ASUS, QNAP, and Synology devices. A previously-undocumented botnet, named PolarEdge, has been expanding around the world for more than a year, targeting a range of network devices. The botnet's goal is unknown at this time, but experts have warned that it poses a significant threat to global internet security.

Infostealer Malware Stole 493 Million Accounts: How Your Data May Have Been Compromised Δ1.72

Recently, news surfaced about stolen data containing billions of records, with 284 million unique email addresses affected. Infostealing software is behind a recent report about a massive data collection being sold on Telegram, with 23 billion entries containing 493 million unique pairs of email addresses and website domains. As summarized by Bleeping Computer, 284 million unique email addresses are affected overall.

Protecting Yourself From Vishing Attacks Surged 442% Last Year Δ1.72

Vishing attacks have skyrocketed, with CrowdStrike tracking at least six campaigns in which attackers pretended to be IT staffers to trick employees into sharing sensitive information. The security firm's 2025 Global Threat Report revealed a 442% increase in vishing attacks during the second half of 2024 compared to the first half. These attacks often use social engineering tactics, such as help desk social engineering and callback phishing, to gain remote access to computer systems.

The Fate of Garantex Hangs in the Balance Δ1.72

An international coalition of law enforcement agencies has seized the official website of Garantex, a Russian cryptocurrency exchange accused of being associated with darknet markets and ransomware hackers. The U.S. Secret Service, working with a coalition of international law enforcement agencies, took down and seized the website following a warrant by the U.S. Attorney’s Office for the Eastern District of Virginia. This move is part of a broader effort to disrupt Garantex's operations in response to its alleged ties to illicit activities.

Aviaton Firms Hit by Devious New Polyglot Malware Δ1.72

Aviation firms in the United Arab Emirates (UAE) were recently targeted by a highly sophisticated business email compromise (BEC) attack looking to deploy advanced malware. The attackers used a compromised email account to share polyglot files with their victims, which deployed a hidden backdoor against aviation firms. Cybersecurity researchers Proofpoint observed that these attacks started in late 2024 and target organizations with a distinct interest in aviation and satellite communications.

Malware Hijacks Nearly 1 Million Windows Devices in Advanced Malvertising Attack Δ1.72

A broad overview of the four stages shows that nearly 1 million Windows devices were targeted by a sophisticated "malvertising" campaign, where malware was embedded in ads on popular streaming platforms. The malicious payload was hosted on platforms like GitHub and used Discord and Dropbox to spread, with infected devices losing login credentials, cryptocurrency, and other sensitive data. The attackers exploited browser files and cloud services like OneDrive to steal valuable information.

Human Rights Abused: Governments Exploit Vulnerabilities to Silence Critics Δ1.71

Amnesty International has uncovered evidence that a zero-day exploit sold by Cellebrite was used to compromise the phone of a Serbian student who had been critical of the government, highlighting a campaign of surveillance and repression. The organization's report sheds light on the pervasive use of spyware by authorities in Serbia, which has sparked international condemnation. The incident demonstrates how governments are exploiting vulnerabilities in devices to silence critics and undermine human rights.