Cygilant Blog

Hackers Moving from Ransomware to Cryptomining Malware

Posted by Trevan Marden on Feb 2, 2018

Hackers are moving from ransomware to cryptomining according to Cisco’s Talos division who reported the shift towards cryptomining on Tuesday. Recently hackers have been finding success with ransomware, with reports of numerous companies and individuals ponying up to unlock their computers. However, now, hackers are finding easier ways to score cash. Ransomware still requires individuals to take action to unlock their systems by sending payments. Many of the victims may not even be familiar with how to purchase bitcoins or prepaid credit cards to make the payment. Others may have satisfactory backups or deem the data locked not important enough to pay for release.

Breaking Down the Top Three Kinetic Hacks of All Time

Posted by John Linkous on Apr 11, 2017

Last Friday night, a cacophony of 156 public warning system sirens sounded in Dallas, Texas.  The sirens weren’t responding to a danger, such as tornados or other similar threats.  Instead, these sirens were hacked, sounding off maximum volume well into the early hours of Saturday morning.  This may see
m like a prank similar to something out of a modern-day “Animal House,” or a badly-scripted Hollywood treatment of hacking culture.  But the reality is that attacks on physical infrastructure represent a potential threat that pales the scope and effect of traditional hacks.

Data Breach Details: The Australian Red Cross Has Over 1.2 Million Records Stolen

Posted by Vijay Basani on Nov 15, 2016

The Australian Red Cross forgot to lock the backdoor to their IT databases, and information was stolen.

The Australian Red Cross is currently dealing with a massive IT security mishap that exposed thousands of Red Cross blood donors' personal information.

"The leak disclosed blood type, previous donations information and donor eligibility answers."

The IT leak didn't just reveal information such as names, telephone numbers, emails, addresses, and birth dates. It also disclosed blood type, records of previous donations, and donor eligibility data.


Troy Hunt, an IT security expert, first discovered the leak after someone contacted and provided him with a snippet of data from that included his personal information. The person then gave Hunt the entire set of data (1.74 GB or 1,286,366 records). The information also included Hunt's wife's personal information.

Data Breach Alert: Yahoo Struck by Hacker “Peace” – 200 Million Accounts Affected

Posted by Shawn O'Brien on Aug 17, 2016

Another big name gets added to the list of 2016 data breaches. Yahoo, the multinational technology company, has its hands full as it deals with trying to confirm the possibility of a data breach. The infamous hacker that goes by the tag of “Peace” has listed a cache of what allegedly appears to be 200 million stolen Yahoo user accounts for sale on the Dark Web. Yahoo has already begun a thorough forensic analysis investigation to the determine the validity of the hacker’s claims and promises that it’s taking this breach "very seriously.” According to reports by Motherboard, the cache supposedly contains usernames, passwords, and dates of birth. At this time, the stolen user data is currently being sold for 3 Bitcoins, or around $1,860, and apparently contains records from “2012 most likely,” according to hacker Peace. Peace has also provided a way to unscramble the hashed credentials, making it easier for buyers to use the stolen information once they get their hands on it.

What Makes Silicon Valley Such a Target for Cyber Attacks?

Posted by Security Steve on Aug 11, 2016

Silicon Valley is a nickname for the southern part of the San Fransisco Bay Area, a region that hosts many of the world's biggest technology companies, including giants like Facebook and Google. The area increasingly finds itself the target of consumer ire for violating privacy expectations, changing product performance in uncomfortable ways, and more.

There’s More than Meets the Eye: Going Beyond Covering Your Laptop Camera

Posted by Shawn O'Brien on Aug 10, 2016


In June 2016, Facebook CEO Mark Zuckerberg made The New York Times for covering his laptop camera with tape. The following explains why individuals choose to block their webcam lenses, and why this cybersecurity technique is not enough.

Most Recent Posts

Subscribe to Email Updates