Stay informed with our 15th April Threat Intelligence Report

April 15, 2024
1 min read

TLDR:

  • Hoya Corporation, Paris Saint-Germain, East Central University, Group Health Cooperative, Paducah Dermatology PLLC, Tarrant County Appraisal District, AT&T, Targus, and CVS Group have all been victims of cyberattacks and data breaches.
  • Microsoft, D-Link, and Citrix have released security updates to address vulnerabilities in their systems.

In the latest Threat Intelligence Report for the week of April 15, 2024, Check Point Research has highlighted several key cyberattacks, data breaches, vulnerabilities, and security updates:

Japanese optics giant Hoya Corporation was targeted in a ransomware attack by the Hunters International ransomware gang, demanding a hefty ransom for stolen data. Paris Saint-Germain, ECU, GHC-SCW, Paducah Dermatology PLLC, TAD, AT&T, Targus, and CVS Group also fell victim to cyberattacks and data breaches with varying impacts on their systems and data.

Microsoft released updates to fix 149 vulnerabilities, including two zero-days actively exploited. D-Link NAS devices faced exploitation due to hard-coded credentials exposure and command injection vulnerabilities. Citrix also addressed vulnerabilities in XenServer and Citrix Hypervisor that could lead to memory exposure or host crashes.

Check Point Research’s Most Wanted Malware report for March 2024 highlighted new deployment methods for Remcos RAT, shifts in ransomware group rankings, and cybersecurity trends for various industries and regions.

Overall, the report underscores the ongoing threat landscape and the importance of proactive cybersecurity measures to mitigate risks and protect sensitive data.

Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives