TheSniper

Ransomware

Nonprofits: What to Do After a Cyberattack — And How to Prevent the Next One

Nonprofits are under attack—literally.  Organizational leadership continues to instruct IT teams to do more with less.  Lean IT teams are getting pounded with the operational day-to-day and with one fire drill after the next, the most important security initiatives around Zero Trust, SASE, Network Access Control (NAC) and Identity Access Management (IAM) get sidelined, leaving […]

Nonprofits: What to Do After a Cyberattack — And How to Prevent the Next One Read More »

Woman in tech, illuminated by blue data light, focused on advanced cybersecurity systems, Generative AI

The Biggest Cybersecurity Challenges of 2025: What You Need to Know

As cyber threats continue to evolve, 2025 is proving to be a critical year for cybersecurity professionals, organizations, and governments alike. From AI-driven attacks to state-sponsored cyber espionage, organizations must stay vigilant to protect their data, infrastructure, and digital assets. In this blog post, we will break down the most pressing cybersecurity issues of today

The Biggest Cybersecurity Challenges of 2025: What You Need to Know Read More »

CDK_Global-Cyber_Attach

Top Cybersecurity Imperatives for Automotive Dealership Management Systems – CDK Cyberattack Shuts Down Dealerships Across the U.S.

The Top Cybersecurity Imperatives for Automotive Dealership Management Systems In today’s digital age, the automotive industry is increasingly reliant on sophisticated dealership management systems (DMS) to streamline operations, enhance customer experiences, and drive growth. However, with this reliance comes a heightened risk of cyber threats. As the Owner or C-Suite Executive of a dealership management

Top Cybersecurity Imperatives for Automotive Dealership Management Systems – CDK Cyberattack Shuts Down Dealerships Across the U.S. Read More »

Deepfake AI Facial Recognition

Deepfake Video with Biometric Technology Tricking Law Firms And Exfiltrating Money

Scams and Deception Deepfake video and sophisticated scams that manipulate video and audio to create highly convincing fake identities or messages from what appear to be trusted individuals are creating a major risk for law firms, the UK Solicitors’ Regulation Authority (SRS) says. The SRA issued a caution to lawyers who heavily rely on video

Deepfake Video with Biometric Technology Tricking Law Firms And Exfiltrating Money Read More »

Sniper Watch: Stop, Call, Wait

Is Your Business Prepared for a Cyber Incident?

Is Your Business Prepared for a Cyber Incident?   In today’s digital age, having a well-written Incident Response plan is not optional, it’s essential. Yet many companies find themselves unprepared when disaster strikes. We recommend these immediate actions for managing unexpected cybersecurity incidents: Stop, Call, Wait. . Stop: Don’t panic.  Halt all operations safely and

Is Your Business Prepared for a Cyber Incident? Read More »

SEC

U.S. Securities & Exchange Commission (SEC) Adopts New Cybersecurity Disclosure Rules

History The Securities and Exchange Commission (SEC) first proposed new cybersecurity disclosure rules on March 8, 2022.  The comment period for the proposed rules closed on May 9, 2022.  The SEC then reopened the comment period on the proposed rules on February 9, 2023, and closed it on April 11, 2023.  Public company directors and

U.S. Securities & Exchange Commission (SEC) Adopts New Cybersecurity Disclosure Rules Read More »

Gigabud RAT Android Banking Malware

Gigabud RAT Android Banking Malware Targets Institutions Across Countries

Account holders of over numerous financial institutions in Thailand, Indonesia, Vietnam, the Philippines, and Peru are being targeted by an Android banking malware called Gigabud RAT. “One of Gigabud RAT’s unique features is that it doesn’t execute any malicious actions until the user is authorized into the malicious application by a fraudster, which makes it

Gigabud RAT Android Banking Malware Targets Institutions Across Countries Read More »

iPhone-Android_Device

Does Turning Your Smartphone (iPhone|Android) Off Protect You From Malware?

We’ve had folks contact us telling us that they’ve solved the cybersecurity problem. They’ve told us that they’ll just shut off their phone when not in use… “What!?!” Would you shut off your smart pacemaker?!? 🤪 Communication devices are meant to do just that… communicate! Malware comes in all shapes and sizes, and can range

Does Turning Your Smartphone (iPhone|Android) Off Protect You From Malware? Read More »

Why Do I Need Multifactor Authentication (MFA)?

🔒 Protecting your online presence is crucial in today’s digital world! As cybersecurity experts, we highly recommend using Multifactor Authentication (MFA) to enhance the security of your accounts. MFA adds an extra layer of protection by requiring multiple forms of verification before granting access. It’s like having a virtual bodyguard for your digital identity! 💂‍♂️💻

Why Do I Need Multifactor Authentication (MFA)? Read More »

CPA Firms - Cybersecurity

Top Business & Cybersecurity Concerns for CPAs in 2023

Cybersecurity Impact on CPA Firms Cybersecurity is a critical issue for businesses and organizations of all sizes and industries, and the accounting profession is no exception. In today’s digital age, sensitive financial data and information are increasingly at risk of being compromised by cybercriminals who seek to steal valuable data, commit fraud, or cause disruption

Top Business & Cybersecurity Concerns for CPAs in 2023 Read More »

How CPA Firms can protect against a cyber attack

How CPA Firms Can Protect Against Cyber Attacks During the Busy Tax Season Within The Next 14 Days

As a CPA owner, it’s crucial to understand the importance of cybersecurity for your business. Cybersecurity is the practice of protecting your computer systems, networks, and sensitive information from unauthorized access, theft, and damage. With the increase in cyber attacks, businesses of all sizes are at risk. In fact, according to a report by Verizon,

How CPA Firms Can Protect Against Cyber Attacks During the Busy Tax Season Within The Next 14 Days Read More »

Hackers Create ChatGPT-Driven Telegram Bots That Can Write Malware

Cyber-criminals are using Microsoft-owned ChatGPT to create Telegram bots that can write malware and steal your data, new research has revealed. Currently, if you ask ChatGPT to write a phishing email impersonating a bank or create malware, it will not generate it.  However, hackers are working their way around ChatGPT’s restrictions and there is an

Hackers Create ChatGPT-Driven Telegram Bots That Can Write Malware Read More »

Hacker uses new ‘Screenshotter’ malware tool to target organizations

A new hacker identified as TA886 targets organizations in the US and Germany with the new custom malware tool “Screenshotter” to perform surveillance and data theft on infected systems. According to BleepingComputer, the previously unknown cluster of activity was first discovered by the US-based security firm Proofpoint in October 2022.  The hacker appears to be

Hacker uses new ‘Screenshotter’ malware tool to target organizations Read More »

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack

Hackers believed to work for Russia have started using a new code execution technique that relies on mouse movement in Microsoft PowerPoint presentations to trigger a malicious PowerShell script. No malicious macro is necessary for the malicious code to execute and download the payload, for a more insidious attack.  A report from threat intelligence company

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack Read More »

Uber Hack

Uber Hacked by 18-Year-Old, Claiming the Company Has Weak Security

What Happened Uber discovered its computer network had been breached on Thursday, leading the company to take several of its internal communications and engineering systems offline as it investigated the extent of the hack.  The breach appeared to have compromised many of Uber’s internal systems, and a person claiming responsibility for the hack sent images

Uber Hacked by 18-Year-Old, Claiming the Company Has Weak Security Read More »

Ransomware

Three Iranian Nationals Charged with Hacking New Jersey Targets

What Happened The U.S. Department of Justice unsealed an indictment Sept. 14 charging three Iranian nationals with allegedly running a massive, global ransomware operation that hacked into the computer networks of multiple U.S. victims, including several in the Garden State. The indictment charges Mansour Ahmadi, Ahmad Khatibi Aghda and Amir Hossein Nickaein Ravari of engaging

Three Iranian Nationals Charged with Hacking New Jersey Targets Read More »

Top Cybersecurity Breaches - 2021

2021: Top Cybersecurity Data Breaches – The Year in Review

*Alert*: Sniper Watch C3 – Inadequate cybersecurity posture continues to be a major leading cause to continued data breaches, disruption, and dismantling of corporate operations. In 2021, thousands of new cybersecurity incidents have been recorded and cyberattacks are continuing to rise.  Cybersecurity insurance premiums are skyrocketing and most organizations are not properly protected from these

2021: Top Cybersecurity Data Breaches – The Year in Review Read More »

Happy Labor Day - Maintain High Alert of Cyberattacks to Emerge

Happy Labor Day: Maintain High Alert of Cyberattacks to Emerge

Sniper Watch and the Cybersecurity & Infrastructure Security Agency (CISA) warns businesses of all sizes to be mindful of risky behaviors that leave networks exposed to cyberattacks – and should be addressed immediately! Summary: Unsupported Software & Applications Single-Factor Authentication – Credential Theft End of Life | End of Support Software Using unsupported software, allowing

Happy Labor Day: Maintain High Alert of Cyberattacks to Emerge Read More »

Ransomware as a Service

Accenture, Large Technology Consulting Giant, Hit With LockBit Ransomware

What Happened Cybercriminals have breached Accenture in an apparent ransomware attack but the global consulting giant says the incident was immediately contained with no impact on it or its systems. The LockBit ransomware gang announced the attack Tuesday night on its dark web leak site, setting a deadline of Thursday evening for payment. Accenture said

Accenture, Large Technology Consulting Giant, Hit With LockBit Ransomware Read More »

Guess Ransomware Attack

Guess Confirms Ransomware Attack and Data Breach

Clothing retailer Guess suffered a ransomware attack and data breach earlier this year that exposed personal information for an unspecified number of individuals. As Bleeping Computer first reported, citing a data breach notification letter issued by Guess to 1,304 affected Maine residents, Guess says criminal hackers accessed its systems from approximately Feb. 2 to Feb. 23 and that the

Guess Confirms Ransomware Attack and Data Breach Read More »

Kaseya MSP Cyber Attack

Major MSP & Supply Chain Hit with Ransomware Affecting 40,000+ Companies

Kaseya, an IT solutions developer for MSPs and enterprise clients, announced that it had become the victim of a cyberattack on July 2, over the American Independence Day weekend. It appears that attackers have carried out a supply chain ransomware attack by leveraging a vulnerability in Kaseya’s VSA software against multiple managed service providers (MSP)

Major MSP & Supply Chain Hit with Ransomware Affecting 40,000+ Companies Read More »

Biometrics Mandates Enforced

New York City Enacts Biometrics Law for Food & Drink Establishments, Entertainment Venues, and Retail Stores

New York City’s Biometric Identifier Information Law goes into effect on July 9. The law applies to food and drink establishments, places of entertainment, and retail stores in New York City that collect, retain, convert, store, or share biometric identifier information (e.g., retina or iris scans, fingerprints, voiceprints, and hand scans) from customers. According to the

New York City Enacts Biometrics Law for Food & Drink Establishments, Entertainment Venues, and Retail Stores Read More »

LinkedIn Data Breach

700 Million LinkedIn User’s Data Collected by Hackers

Collected data makes it easier for spammers, phishers and stalkers Data scraped from about 700 million LinkedIn profiles — more than 90% of the entire declared LinkedIn member base — is being offered for sale in an online cybercrime marketplace. The data includes full names, workplace email addresses, dates of birth, workplace addresses, mobile phone

700 Million LinkedIn User’s Data Collected by Hackers Read More »

Cryptomining

Fileless Malware on the Rise, Hackers Now Cryptomining Gamers’ PCs

The value of cryptocurrencies has fluctuated wildly, but the value is still high enough to garner a lot of attention, both legitimate and malicious. Most of the malicious activity we see is done for financial gain, and cryptocurrencies have provided attackers with a lucrative new avenue to pursue: cryptocurrency mining. Over the past year, we

Fileless Malware on the Rise, Hackers Now Cryptomining Gamers’ PCs Read More »

Malware Skyrockets to 74%

In 2021, Zero Day Malware Attacks Skyrocket to 74% of All Discovered Attacks

In the first quarter of 2021, 74% of malware threats detected were known to be Zero Day Attacks – meaning an attack sequence in which a signature-based antivirus identifier was not present at the time of the infection. In early 2021, it was the highest level of Zero Day Malware Detections ever recorded.  Organizations must

In 2021, Zero Day Malware Attacks Skyrocket to 74% of All Discovered Attacks Read More »

Cyber Attack on Worlds Largest Meat Supplier Skyrockets Prices

United States-based food processing company JBS USA has confirmed falling victim to a cyber attack, with the aftermath affecting its North American and Australian systems. “On Sunday, May 30, JBS USA determined that it was the target of an organized cybersecurity attack, affecting some of the servers supporting its North American and Australian IT systems,”

Cyber Attack on Worlds Largest Meat Supplier Skyrockets Prices Read More »

Potential Nation State Attack on Florida Water Treatment System – OT Cybersecurity Prevention Measures

Hacker or Hacker Group Attempt to Alter Chemical Water Treatment Proportions to Inflict Harm to Citizens   A hacker gained access into the water treatment system of Oldsmar, Florida, on Friday and tried to increase the levels of sodium hydroxide — commonly referred to as lye — in the city’s water, officials said, putting thousands

Potential Nation State Attack on Florida Water Treatment System – OT Cybersecurity Prevention Measures Read More »

FireEye Security Vendor Compromised: Nation-State Threat Actors Steal Hacking Tools

The N.S.A.’s tools were most likely more useful than FireEye’s since the U.S. government builds purpose-made digital weapons. FireEye’s Red Team tools are essentially built from malware that the company has seen used in a wide range of attacks. Still, the advantage of using stolen weapons is that nation-states can hide their own tracks when

FireEye Security Vendor Compromised: Nation-State Threat Actors Steal Hacking Tools Read More »

SolarWinds Breach: Malware Breach Affecting 18,000 Customers

A key malicious domain name used to control potentially thousands of computer systems compromised via the months-long breach at network monitoring software vendor SolarWinds was commandeered by security experts and used as a “killswitch” designed to turn the sprawling cybercrime operation against itself, KrebsOnSecurity has learned. Austin, Texas-based SolarWinds disclosed this week that a compromise of its

SolarWinds Breach: Malware Breach Affecting 18,000 Customers Read More »

Ransomware

Ransomware 2020: The Year In Review – How It Infects Everything!

Ransomware is rapidly surfacing at pandemic rates.  Research shows that a business is attacked every 11 seconds and attacks are estimated to cost businesses approximately $20 Billion dollars this upcoming year! There are fundamental ways to protect your organization and close the gaps. Here is the 2020 year in review: January Starting with January, let’s look

Ransomware 2020: The Year In Review – How It Infects Everything! Read More »

COVID-19 Hacker attacks Work from Home Users

Cyberattacks now seen at Unprecedented Scale as Teleworkers Increase in Massive Numbers

As recent events have now shaped the culture of our business and personal life, we are now entering a new phase of the aftershock of the COVID-19 pandemic.  Chaos, survival mode, quarantining, shifted focus, uncertainty, mass layoffs, financial disruption, and large companies now declaring bankruptcy have resulted in businesses and individuals shifting their attention to

Cyberattacks now seen at Unprecedented Scale as Teleworkers Increase in Massive Numbers Read More »

Teleworker Productivity at Home

Maximize Business Continuity & Ensure Security during Unpredictable, Trying Times

Current events are impacting our personal and business livelihood, creating uncertainty and disrupting the organization’s focus.  Businesses are now reacting, and making changes to accommodate employees working from home, which opens up vulnerabilities, worker performance issues, and gaps without the proper tools, visibility, and proactive protection. Sniper Watch is here to make sure your business,

Maximize Business Continuity & Ensure Security during Unpredictable, Trying Times Read More »

WaWa Data Breach

Wawa’s Massive Credit Card Breach: 30 Million Customer’s Details for Sale Online

The Wawa breach may rank as one of the biggest of all time, comparable to earlier Home Depot and Target breaches. On Monday, hackers put up for sale the payment card details of more than 30 million Americans and over one million foreigners on Joker’s Stash, the internet’s largest carding fraud forum. This new “card

Wawa’s Massive Credit Card Breach: 30 Million Customer’s Details for Sale Online Read More »

Microsoft Breach 2020

Microsoft Data Breach Exposes 250 Million Customer Service and Support Records

Microsoft has admitted that between December 5th-31st 2019, a mis-configuration of the security rules for (what should have been) an internal customer support database left it exposed for anyone to access – no password required. According to researcher Bob Diachenko, who discovered the database was accessible to anyone capable of running a web browser, the nearly 250

Microsoft Data Breach Exposes 250 Million Customer Service and Support Records Read More »

CyrusOne Datacenter

Major Datacenter Confirms Ransomware Attack, Affecting 6 Customers

CyrusOne confirmed a ransomware attack to its managed services division and said the attack affected six customers served primarily from its New York data center, located in Wappingers Falls, New York. The company said it was “working to restore availability issues to six managed service customers due to a ransomware program encrypting certain devices.” Related: Ransomware Has

Major Datacenter Confirms Ransomware Attack, Affecting 6 Customers Read More »

Malware Exploit

Echobot Malware Now Up to 71 Exploits, Targeting SCADA Networks

F5 Networks researchers have detected a new variant of the “Echobot” malware, now consisting of 71 exploits. The authors continue to follow the trend of arming the malware and for the threat group to expand its operation. These newly added exploits target both old and new vulnerabilities, adding as new ones target industrial control system

Echobot Malware Now Up to 71 Exploits, Targeting SCADA Networks Read More »

New Jersey’s Largest Hospital Pays Hackers in Ransomware Breach

New Jersey’s largest hospital system said last week it paid an extortion fee to hackers who had disrupted medical facilities with a ransomware attack. Hackensack Meridian Health, based in Edison, New Jersey, said Dec. 13 it was working to restore its computer systems following a Dec. 2 ransomware attack that forced administrators to cancel roughly

New Jersey’s Largest Hospital Pays Hackers in Ransomware Breach Read More »

Fake Veterans Hiring Website

FAKE VETERAN HIRING WEBSITE

We’ve discovered a threat actor attempting to take advantage of Americans who may be seeking a job, especially military veterans. The actor, previously identified by Symantec as Tortoiseshell, deployed a website called hxxp://hiremilitaryheroes[.]com that posed as a website to help U.S. military veterans find jobs. The URL is strikingly close to the legitimate service from

FAKE VETERAN HIRING WEBSITE Read More »

Google found a way to remotely attack Apple iOS devices by sending a boobytrapped iMessage

Details weren’t shared at the time, but we now know that the iOS security update addressed critical vulnerabilities discovered by Google security researchers Samuel Groß and Natalie Silvanovich that could allow a remote attacker to attack an iPhone just by sending a maliciously-crafted iMessage. Thankfully the vulnerabilities, which could most likely have been sold to

Google found a way to remotely attack Apple iOS devices by sending a boobytrapped iMessage Read More »

British Airways Fined $183 Million Under GDPR Over 2018 Data Breach

Britain’s Information Commissioner’s Office (ICO) today hit British Airways with a record fine of $183 million for failing to protect the personal information of around half a million of its customers during last year’s security breach. British Airways, who describes itself as “The World’s Favorite Airline,” disclosed a breach last year that exposed personal details and

British Airways Fined $183 Million Under GDPR Over 2018 Data Breach Read More »

Operating Systems

More Than Half of SMB Devices Run Outdated Operating Systems

66% of devices in small-to midsized businesses are based on expired or about-to-expire Microsoft OS versions, Alert Logic study found. New research underscores security weaknesses in small-to midsized businesses including a dependence on antiquated Microsoft operating systems, encryption misconfigurations, poor patching regimes, and reliance on outdated Exchange 2000 email servers. The findings, published this week

More Than Half of SMB Devices Run Outdated Operating Systems Read More »

Scroll to Top