<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>Data Theft | Business Upturn</title>
	<atom:link href="https://www.businessupturn.com/news/topic/data-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businessupturn.com</link>
	<description>India&#039;s leading business and financial news portal — markets, economy, stocks and corporate news.</description>
	<lastBuildDate>Wed, 21 Feb 2024 16:48:36 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.businessupturn.com/wp-content/uploads/2023/07/favicon-150x150.jpg</url>
	<title>Data Theft | Business Upturn</title>
	<link>https://www.businessupturn.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Operation Texonto exposes broader cybersecurity concerns in Ukraine conflict</title>
		<link>https://www.businessupturn.com/technology/cyber-security/operation-texonto-exposes-broader-cybersecurity-concerns-in-ukraine-conflict/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Wed, 21 Feb 2024 16:48:36 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Alexei Navalny]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[Russia]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=401866</guid>

					<description><![CDATA[Russia&apos;s &quot;Operation Texonto&quot; uses lies and manipulation to scare Ukrainians, targeting anxieties about food, medicine, and war.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;A disturbing campaign of disinformation and psychological manipulation has emerged, targeting Ukrainian citizens to erode their morale and stoke anxieties. Dubbed “Operation Texonto” by cybersecurity firm ESET, this Russia-aligned effort leverages a potent mix of fabricated narratives and manipulative tactics to sow discord and doubt within Ukrainian society. The campaign operates across multiple waves designed to exploit specific vulnerabilities and anxieties.&lt;/p&gt;
&lt;p&gt;In the initial phase, emails masquerading as official communications from Ukrainian government agencies spread misinformation about impending shortages of food, medicine, and heating. These fabricated warnings, complete with forged logos and seemingly credible sources, aim to create panic and distrust toward the Ukrainian government’s ability to provide essential resources.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:433&quot;&gt;Beyond essential supplies, the campaign delves into even more disturbing territory. One email template, targeting potential conscripts, suggests self-harm as a means to avoid military service, advocating for the amputation of limbs to escape deployment. This tactic, exploiting the fear of war and the potential for forced conscription, represents a deeply cynical attempt to exploit individual anxieties for broader strategic goals.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:374&quot;&gt;The campaign’s reach extends beyond Ukraine’s borders. Emails targeting an Italian shoe manufacturer suggest a broader attempt to sow discord and manipulate public opinion internationally. Additionally, emails referencing jailed Russian opposition leader Alexei Navalny hint at potential efforts to target his supporters and further fracture the Russian political landscape.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:384&quot;&gt;Operation Texonto’s activities extend beyond mere disinformation. The same infrastructure used for the propaganda campaign was later repurposed to distribute spam emails promoting fake Canadian pharmacies. This shift suggests a potential attempt to monetize the campaign’s infrastructure, highlighting the opportunistic nature of the operation and its potential financial motivations.&lt;/p&gt;
&lt;p data-sourcepos=&quot;13:1-13:469&quot;&gt;ESET’s findings reveal a concerning development in the ongoing conflict between Russia and Ukraine. This campaign underscores the increasingly sophisticated use of information warfare as a tool to undermine morale, sow discord, and manipulate public opinion.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Operation-Texonto-exposes-broader-cybersecurity-concerns-in-Ukraine-conflict.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Operation Texonto exposes broader cybersecurity concerns in Ukraine conflict]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Operation-Texonto-exposes-broader-cybersecurity-concerns-in-Ukraine-conflict.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Microsoft Azure breach exposes critical user data in large-scale cyberattack</title>
		<link>https://www.businessupturn.com/technology/cyber-security/microsoft-azure-breach-exposes-critical-user-data-in-large-scale-cyberattack/</link>
		
		<dc:creator><![CDATA[Eesha Chakraborty]]></dc:creator>
		<pubDate>Sun, 18 Feb 2024 07:48:42 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cloud security]]></category>
		<category><![CDATA[Cyberattack]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=400028</guid>

					<description><![CDATA[Microsoft Azure suffers a major security breach, compromising hundreds of accounts, including executives. Phishing emails and cloud account takeover techniques were used to steal data, potentially for financial gain.]]></description>
										<content:encoded><![CDATA[&lt;p data-sourcepos=&quot;3:1-3:331&quot;&gt;Microsoft’s cloud service, Microsoft Azure, suffered a significant security breach exposing sensitive user data of hundreds of accounts, including those belonging to high-level executives. This attack, described as the largest in Azure’s history, highlights the evolving sophistication of cybercriminals and the ever-present threat to online security.&lt;/p&gt;
&lt;p data-sourcepos=&quot;5:1-5:201&quot;&gt;Proofpoint, a cybersecurity company, identified the attack as utilizing a campaign previously detected in November 2023. This campaign employed a potent combination of phishing emails and cloud account takeover (CTO) techniques. Phishing emails, often disguised with seemingly innocuous anchor text like “View document,” contained malicious links redirecting users to fraudulent websites designed to harvest login credentials. Once obtained, these credentials were used to access sensitive data within OfficeHome and Microsoft 365 applications.&lt;/p&gt;
&lt;p data-sourcepos=&quot;7:1-7:137&quot;&gt;The meticulous planning behind the attack is evident in the targeted selection of victims. While both mid-level and senior employees were compromised, positions like sales directors, account managers, and CEOs were prioritized. This strategic approach allowed attackers to infiltrate various organizational levels, potentially granting access to a wider range of confidential information.&lt;/p&gt;
&lt;p data-sourcepos=&quot;9:1-9:453&quot;&gt;Furthermore, the attackers employed sophisticated tactics to maintain control after compromising accounts. By deploying their own multifactor authentication (MFA) methods, such as adding alternate mobile numbers or setting up fraudulent authentication apps, they effectively prevented legitimate users from regaining access. Additionally, attackers meticulously removed any trace of their activity, further complicating detection and mitigation efforts.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:311&quot;&gt;The primary motives behind this cyberattack are suspected to be data theft and financial fraud. While the exact perpetrators remain unidentified, initial investigations suggest potential involvement from actors based in Russia and Nigeria, based on the utilization of local fixed-line ISPs within those regions.&lt;/p&gt;
&lt;p data-sourcepos=&quot;11:1-11:311&quot;&gt;Microsoft, currently conducting a thorough investigation into the incident, is actively notifying affected customers and taking steps to address vulnerabilities exploited in the attack.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2024/02/Microsoft-Azure-breach-exposes-critical-user-data-in-large-scale-cyberattack.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Microsoft Azure breach exposes critical user data in large-scale cyberattack]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2024/02/Microsoft-Azure-breach-exposes-critical-user-data-in-large-scale-cyberattack.jpg" width="1200" height="675" />
	</item>
		<item>
		<title>Is zoom a Chinese App? Here’s the Truth you’ve been waiting for!!!</title>
		<link>https://www.businessupturn.com/technology/apps/is-zoom-a-chinese-app-heres-the-truth-youve-been-waiting-for/</link>
		
		<dc:creator><![CDATA[Shreejit Shelar]]></dc:creator>
		<pubDate>Sun, 21 Mar 2021 10:48:09 +0000</pubDate>
				<category><![CDATA[Software & Apps]]></category>
		<category><![CDATA[Data Theft]]></category>
		<category><![CDATA[Indo-China]]></category>
		<category><![CDATA[MNC]]></category>
		<category><![CDATA[ZOOM App]]></category>
		<guid isPermaLink="false">https://www.businessupturn.com/?p=100065</guid>

					<description><![CDATA[Zoom Video Communications, Inc. is a global MNC that has 17 co-located data centers, and naturally, it also has one in China.]]></description>
										<content:encoded><![CDATA[&lt;p&gt;The rising tensions between India and China have also strained the socio-economic relations between the two nations. The app has come under scrutiny for its alleged association with the Chinese market and continues to go unfazed despite the suppression of Chinese goods or products by the government of India.&lt;/p&gt;
&lt;p&gt;Last year, the Indian government banned 59 Chinese apps, however, the debate for its origin prolongs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Genesis of Zoom App&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The popular video calling app was founded by Eric Yuan, a Chinese-American billionaire businessman, engineer, and the CEO of the Zoom App. As the reports suggest, Yuan possesses 22 percent shares of the video calling app that holds its roots in the American economy as well.&lt;/p&gt;
&lt;p&gt;Zoom Video Communications, Inc. is a global MNC (Multinational Corporation/Company) that was founded and headquartered in California.&lt;/p&gt;
&lt;p&gt;Now, the application being a multi-national company, it is obvious that the MNC also has employees in China. It has 17 co-located data centers and naturally, it also has one in China.&lt;/p&gt;
&lt;p&gt;The user interface of the app is easy due to which every person uses it. The app also offers one-to-one meetings and 40-minute group calling. The app is designed in such a way that it ensures meeting data of the users outside of China doesn’t enter the country.&lt;/p&gt;
&lt;p&gt;It has been found that the video conferencing in zoom is not encrypted end to end which can cause a leak of the data in between and can hinder one’s privacy.&lt;/p&gt;
&lt;p&gt;Interestingly, the application was reportedly accused of ‘Data Theft’ in 2020!&lt;/p&gt;
&lt;p&gt;But, is Zoom a Chinese app? Well, Here’s an interesting update for you!&lt;/p&gt;
&lt;p&gt;The answer is – NO. Zoom or Zoom Communications, Inc. is not a Chinese company at all but in fact, it is an American company.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Indians Cry for Boycott of Zoom&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Following the rise of Indo-China border tension in Ladakh, a chorus of demands, both on and off social and legacy media called for a ban on Chinese imports including products and apps. Amid the volley of boycott calls, the Indian government banned 59 Chinese apps. Yet, numerous remained unsatisfied as they called for a further ban on apps like Zoom. Not just Zoom, Twitter users also called for a ban on gaming app PUBG, and messaging app WhatsApp.&lt;/p&gt;
]]></content:encoded>
					
		
		
		<media:content url="https://www.businessupturn.com/wp-content/uploads/2021/03/Zoom.jpg" medium="image" width="1200" height="675"><media:title type="html"><![CDATA[Is zoom a Chinese App? Here’s the Truth you’ve been waiting for!!!]]></media:title></media:content>
<media:thumbnail url="https://www.businessupturn.com/wp-content/uploads/2021/03/Zoom.jpg" width="1200" height="675" />
	</item>
	</channel>
</rss>
