News Flash: AI Gets Safer, HHS Hacked, CISA Chief Swatted

January 26, 2024
1 min read


  • Hackers have stolen millions of dollars in grant money from the Department of Health and Human Services (HHS). The attackers gained access to an HHS system that processes civilian grant payments and withdrew roughly $7.5 million that was set aside for five accounts, Bloomberg reported.
  • SatoshiLabs is warning of phishing attempts after a threat actor gained unauthorized access to a third-party support ticketing portal on January 17, likely accessing the contact information of 66,000 users who have interacted with Trezor Support since December 2021. The threat actor has already sent phishing emails to at least 41 customers, requesting sensitive information.
  • A threat actor announced on a hacking forum that they were selling a database containing the email addresses, names, and usernames of 15 million Trello users. The information has been added to the breach notification service Have I Been Pwned. Atlassian, which owns Trello, told SecurityWeek that the data was not obtained via unauthorized access, but that the threat actor had been “testing a pre-existing list of email addresses against publicly available Trello user profiles”. The threat actor had been abusing a Trello REST API to query publicly available account information based on email addresses, BleepingComputer says.
  • Jen Easterly, the director of US cybersecurity agency CISA, was the target of a swatting attempt on December 30. Police in Arlington County, Virginia, received a 911 call that a shooting had occurred at her residence, The Record reports. Other state and federal government officials were swatted in the recent months as well.
  • Menlo Security has published a report focusing on browser-based phishing attacks. The company detected over 550,000 attacks in the past year and reported seeing a 198% increase. The number of attacks classified as evasive increased 206%.
  • Reports focusing on ransomware were published this week by Symantec, GuidePoint, and Dragos. Symantec said the end of ransomware gangs’ reliance on critical vulnerabilities could be near. GuidePoint found an 80% year-over-year increase in activity and significant escalations in coercive tactics. Dragos looked at attacks aimed at industrial organizations in Q4 2023.
  • Trend Micro reported that the Kasseika ransomware is the latest to join the bring-your-own-vulnerable-driver (BYOVD) trend. Some evidence suggests the cybercriminals behind Kasseika have obtained the source code of the BlackMatter ransomware.
  • A dozen government agencies from around the world have published joint guidance on the secure use of AI systems. The guidance provides an overview of AI-related threats and recommendations for managing AI-related risks.

Latest from Blog

Top VPN’s privacy claims confirmed by independent auditors

TLDR: Independent auditors from Deloitte Romania confirmed CyberGhost VPN’s privacy claims through a detailed audit of their systems. Auditors found that CyberGhost’s no-logs infrastructure works as expected, ensuring user data privacy. Independent

MediSecure hacked with massive ransomware data breach

Summary of ‘MediSecure hit by large-scale ransomware data breach’ TLDR: MediSecure, an Australian prescriptions provider, was hit by a large-scale ransomware attack. The incident is believed to have originated from one of

Equalizing cybersecurity for all

TLDR: A discussion on how organizations can enhance their cybersecurity posture with Blumira’s automated threat monitoring, detection, and response solutions. Blumira is working to lower the barrier to entry in cybersecurity for