Since 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the cornerstone of patient privacy. The act established standards for how healthcare organizations handle and share patient data, creating a framework for ensuring confidentiality. But the healthcare landscape…
Category: Information Security Buzz
Sneaky 2FA Kit Exposes Vulnerabilities in 2FA Security
Cybersecurity researchers from Sekoia have discovered a new Adversary-in-the-Middle (AiTM) phishing kit named “Sneaky 2FA,” targeting Microsoft 365 accounts. First discovered in December last year, this phishing kit has been active since at least October 2024 and is distributed as…
DORA Comes into Force: Experts Weigh In on Its Impact and Opportunities
Today marks the enforcement of the Digital Operational Resilience Act (DORA), a regulation aimed at strengthening the financial sector’s defenses against cyber threats and operational risks. With its focus on ICT risk management, incident reporting, and operational resilience, DORA sets…
Educate, Prepare, & Mitigate: The Keys to Unlocking Cyber Resilience
In 2024, consumers saw an array of cybersecurity incidents that impacted them directly, and in dramatic ways. From the Change Healthcare attack that impacted healthcare systems and prevented some from getting medication, to the more recent issues involving Ahold Delhaize…
O’Reilly 2025 Tech Trends: AI Skills Surge as Security Takes Center Stage
The 2025 technology landscape reveals a year of seismic shifts driven by surging interest in AI and an intensified focus on cybersecurity governance. Insights from the latest O’Reilly 2025 Technology Trends Report shed light on these pivotal changes shaping the…
DOJ, FBI Dismantle Malware Used by China-Backed Hackers in Global Operation
In an international effort, the US Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) have successfully eliminated a sophisticated malware threat known as “PlugX” from over 4,200 computers across the United States. The malware, used by bad…
Critical Infrastructure Embraces CISA CyHy Service
Critical infrastructure organization enrollment in CISA’s Cyber Hygiene (CyHy) service surged 201% between 1 August 2022, and 31 August 2024, a new report released by the US cybersecurity agency has revealed. The CISA CyHy service is a suite of free…
UK Government Seeking to ‘Turbocharge’ Growth Through AI
Earlier this week, UK Prime Minister Keir Starmer released a statement and made a subsequent speech unveiling and endorsing his government’s AI Opportunities Action Plan (AOAP). He declared Artificial intelligence (AI) to be “the defining opportunity of our generation” foreshadowing…
RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks
A sophisticated Python-based backdoor, potentially developed using AI, has been identified as a critical tool for RansomHub affiliates to infiltrate and maintain access to compromised networks. The discovery, made by Andrew Nelson, Principal Digital Forensics and Incident Response (DFIR) Consultant…
The Year of Proactive Defense: Staying Ahead of Threat Actors
As January reaches its midpoint, more cybersecurity experts have weighed in on what the year ahead holds for the industry. From the rapid advancement of artificial intelligence to evolving strategies in application security and a renewed focus on education and…
Critical RCE Vulnerability in Aviatrix Controller: Wiz Issues Urgent Patch Advisory
The Wiz Incident Response team is actively addressing multiple security incidents linked to CVE-2024-50603, a critical unauthenticated remote code execution (RCE) vulnerability in Aviatrix Controller. This flaw, rated the maximum CVSS score of 10.0, poses a severe risk of privilege…
AWS S3 Buckets Under Siege: New Ransomware Exploits SSE-C
Research from the Halcyon RISE Team has revealed that a ransomware actor dubbed “Codefinger” has launched a new campaign on Amazon S3 buckets, leveraging WS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data and render victims powerless to…
The Looming Crisis: Meta, Misinformation, and Public Trust
Meta’s jaw-dropping announcement that it is ending its third-party fact-checking program is likely to trigger increased activity from fake accounts and troll farms, which specialize in disseminating intentional falsehoods. The social media giant’s decision to end its fact-checking initiatives raises…
US Tightens AI Export Controls to Curb Adversarial Misuse
In a move to cement the US’s position as a global leader in artificial intelligence (AI), the Biden-Harris Administration has unveiled an Interim Final Rule on AI Diffusion. The policy hopes to improve national security and economic strength while ensuring…
HIPAA to Mandate Increased Cybersecurity Measures in Response to Escalating Number of Attacks
The U.S. Department of Health and Human Services (HSS) Office for Civil Rights (OCR) has published a Notice of Proposed Rulemaking (NPRM) proposing substantial cybersecurity requirements for all regulated entities and their business associates to be added to the HIPAA…
The AI Conundrum in Security: Why the Future Belongs to the Bold
When it comes to artificial intelligence, there’s no denying its transformative power. In fields ranging from medicine to logistics, AI has redefined the art of the possible. But in cybersecurity, AI is less a revolution and more an evolution—a tool…
AI in Cybersecurity: Thinking Like Hackers to Build Stronger Defenses
As we hit the two-year anniversary of the release of ChatGPT, we see that businesses across all sectors have started adopting generative AI tools to create content of all kinds. But many are discovering that these tools have capabilities that…
Rethinking Age Verification for Social Media: Privacy-Friendly Solutions for Safeguarding Kids
The digital landscape has become an integral part of our lives, and social media platforms are at its heart. While these platforms offer undeniable benefits in connecting people and fostering communities, they also pose significant risks, especially for children. Exposure…
Three Russian Nationals Indicted for Operating Cryptocurrency Mixers in Money Laundering Scheme
Three Russian nationals have been charged for their involvement in operating cryptocurrency mixing services Blender.io and Sinbad.io, according to an indictment unsealed on January 7 by a federal grand jury in the Northern District of Georgia. The charges stem from…
Medusind Data Breach Exposes Over 360,000 Individuals’ Healthcare Info
Medusind, a healthcare revenue cycle management provider, has disclosed a data breach that compromised the personal and health information of 360,934 people. The breach, which happened over a year ago, affirms the ongoing cybersecurity challenges in the healthcare sector. The…
Huge Changes Predicted for the Data Privacy Landscape
Although 2025 is now well underway, it’s not too late to ponder what the year will bring. The coming year is set to witness huge changes in the data privacy landscape, and there’s no harm in trying to stay ahead…
New Banshee Malware Targeting macOS Users Remained Undetected for Months
Check Point Research (CPR) has uncovered a sophisticated new version of the Banshee macOS Stealer malware, capable of stealing browser credentials, cryptocurrency wallets, and other sensitive data. This latest version, undetected for over two months, raises alarms for macOS users…
NFL Giants Green Bay Have Their Online Defense Breached
Whilst the four-time Superbowl Champions, The Green Packers, have rightly been drawing praise this season for their on-field defensive performances, the Organization’s online defense has been called into question following the disclosure of a significant data breach affecting thousands of…
Important Preventative Strategies for Avoiding and Recovering from Ransomware Threats
All organizations have their share of struggles when trying to scale successfully. Considering how competitive most industries have become, prioritizing operational agility is often critical and requires a high level of adaptability to gain and retain market share. However, while…
It’s Time Businesses Address the UK’s Cybersecurity Talent Shortage
UK Prime Minister Keir Starmer recently pledged to ‘Get Britain Working Again’. This comes as a new government whitepaper highlights a troubling rise in economic inactivity and stagnation in unemployment, currently hovering around 1.5 million. When we consider the UK’s…
VIPRE Security Shares Cybersecurity Trends for 2025
Last year saw increasingly sophisticated cybersecurity threats as malicious actors leveraged all forms of AI to create difficult-to-detect phishing attacks, deepfakes, and ransomware incidents. To counter these, organizations adopted AI-driven security solutions, including threat detection, automated incident response, and intelligent vulnerability…
Ivanti Warns of Active Exploitation of a Vulnerability in Connect Secure
Organizations are urged to act swiftly to address vulnerabilities impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways by sticking to the latest guidance from the vendor. Ivanti has released a critical security update addressing these vulnerabilities, identified as CVE-2025-0282…
Almost 8500 People Affected by Casio Data Leak
Casio has said nearly 8500 people were affected by a ransomware attack that compromised its servers on 5 October last year. The attack led to data leaks, including internal documents and personal information, but no credit card information was included…
E-commerce Faced Heightened Cybersecurity Threats During Holiday Season
While lucrative for e-commerce businesses, the holiday shopping season also brings a surge in cyber threats. A recent study by Liquid Web highlights a worrying trend: December, the most critical month for online retailers, sees a staggering 31% increase in…
Greece’s 2024 Cyber Threat Landscape: A Year of Increased and Varied Attacks
The year 2024 proved challenging for cybersecurity in Greece, with a significant surge in the volume and sophistication of cyberattacks. Ransomware attacks, Distributed Denial-of-Service (DDoS) attacks, and Advanced Persistent Threats (APTs) all significantly disrupted businesses, government services, and critical infrastructure.…
Moxa Devices Vulnerable to Cyberattacks, Threatening Industrial Networks
Critical vulnerabilities discovered in Moxa’s industrial networking devices could allow privilege escalation and OS command injection, exposing critical infrastructure to potential cyberattacks. In a security advisory, Moxa said that affected models include EDR and TN series routers widely used in…
When is a RAT, not a RAT?
Have you heard the story about the RAT that pretended to be a RAT? If not, you’d better sit down for this one. There’s a RAT in my kitchen Last month, a malicious package, ethereumvulncontracthandler, was identified on the npm…
The Future of Cybersecurity: Leveraging AI SOC Analysts to Combat Evolving Threats
At Information Security Buzz, we deliver the latest cybersecurity news and insights, engaging with various companies to understand their goals, objectives, and contributions to advancing cybersecurity. In this interview, we spoke with Kamal Shah, Co-founder and CEO of Prophet Security,…
US Treasury Sanctions Chinese Tech Firm Over Links to State-Sponsored Attacks
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Beijing-based Integrity Technology Group (Integrity Tech) for its involvement in cyber intrusion campaigns targeting US entities. Integrity Tech has been linked to Flax Typhoon, a Chinese…
FireScam Malware Campaign Highlights Rising Threat to Mobile Users
The ubiquity of mobile applications has created a perfect storm for bad actors, offering ample opportunities to exploit unsuspecting users. One of the latest instances is FireScam, a sophisticated malware that targets Android devices. Disguised as a fake “Telegram Premium”…
High-Severity Vulnerability Discovered in Nuclei: What You Need to Know
An engineering team from Wiz has discovered a critical vulnerability in Nuclei, a popular open-source security tool developed by ProjectDiscovery. The vulnerability, assigned as CVE-2024-43405, enables malicious actors to bypass the tool’s signature verification process, potentially enabling arbitrary code execution.…
Diving into Azure Lateral Movement with Pass-the-PRT
One of the most concerning attack methods I’ve come across recently is ‘Pass-the-PRT.’ It’s not the most likely of cyberattacks, but if successful – your organization’s security is in trouble. And that’s precisely what makes it dangerous—it leverages legitimate authentication…
2024 Year in Review (Part 2)
July AT&T announced (in a financial filing) the discovery of a data breach dating back to 2023 that affects almost every AT&T customer. “The stolen data also includes call records of customers with phone service from other cell carriers that…
Navigating the Cybersecurity Landscape: Insights on AI, FTC Safeguards, and Building Resilient Cyber Cultures
With the rise of sophisticated cyber threats and the growing complexity of the digital landscape, entities are in a desperate battle to stay ahead of potential risks. Information security is no longer just an IT issue but a critical component…
2024 Year in Review (Part 1)
As 2023 came to a close, it was easy to predict that breaches would continue to dominate the cybersecurity news. However, the scale of the events, specifically the Change Healthcare breach eclipsed all others for the year. The other event…
Phishing Report Findings Call for a Fundamental Shift in Organizational Approaches to Defense
SlashNext has released its 2024 Phishing Intelligence Report, a comprehensive study identifying and analyzing the vectors most exploited by cybercriminals in the past year. The findings and how the data is trending form recommendations for organizations on the best areas…
CISA and EPA Warn Water Facilities to Secure Exposed HMIs
The US government is imploring water and wastewater organizations to secure internet-exposed human-machine interfaces (HMIs) that provide access to industrial machines against cyberattacks. Unauthorized access to these HMIs can allow malicious actors to view sensitive information and disrupt operations. HMIs…
Data Sovereignty in a Cloud-Driven World is not a Given
Data sovereignty refers to the principle that digital information can remain subject to the laws and governance structures of the country where it is collected or stored. But this, like most things related to the cloud, is more complicated than…
These Six Innovations Have the Potential to Transform Cybersecurity in 2025
The cybersecurity landscape evolves at a breakneck pace, with new, sophisticated threats challenging even the most intricate defenses. As 2025 approaches, several groundbreaking innovations are poised to redefine how businesses and individuals secure their digital assets and respond to emerging…
Nine Updated Security Measures for the Modern Smart Home
Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…
The Hidden Risks of Virtual Desktop Infrastructure (VDI) and How to Mitigate Them
Virtual Desktop Infrastructure (VDI) is white hot. Just ask Fortune Business Insights, which reports that the VDI market size will grow from $15.61 billion in 2024 to $80.82 billion by 2032, with a CAGR of 22.8%. One catalyst behind this adoption…
9 Updated Security Measures for the Modern Smart Home
Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…
Cybersecurity in 2025 – A New Era of Complexity
As the world steps into 2025, the cybersecurity landscape is set to evolve at an unprecedented pace, driven by the convergence of emerging technologies, sophisticated threats, and tightening regulations. The fourth edition of this report delves into the critical trends…
Hackers Target Global Sporting Events with Fake Domains to Steal Logins
New research from Palo Alto Networks has revealed that cybercriminals are taking advantage of high-profile sporting events to conduct scams, phishing, and malware attacks through suspicious domain registrations and other malicious activities. Domain Abuse Surges During Paris Olympics For example,…
It’s Beginning to look a lot like Grinch bots
Almost three-quarters (71%) of UK consumers believe that nefariously named ‘Grinch bots’ are ruining Christmas by acquiring all the best presents. This was one of the findings of new research from Imperva, a Thales company. Grinch bots are automated programs…
Not Every Gift Comes from Santa Claus: Avoiding Cyber Scams This Holiday Season
The holidays are a time for joy, connection, and giving, but amidst the festive cheer lies a growing cyber threat that’s anything but jolly. As we fill our online shopping carts with gifts for loved ones, scammers are busy crafting…
How to Defend Against High Cyberthreat Activity During the Holidays
Imagine if Santa’s workshop were brought down by a ransomware attack in December — children around the world would be disappointed. A multitude of holidays between Thanksgiving and New Year’s creates an optimal opportunity for cybercriminals, with government reports confirming…
SpartanWarriorz Phish Kits: Uncovered
Cybercriminals are using phish kits developed by authoring group SpartanWarriorz to target over 300 global brands, new research from Fortra has revealed. Attackers using the kits tend to target financial institutions in North America and Europe, retail, delivery services, and…
No User Interaction, no Alerts: Azure MFA Cracked in an Hour
If you look inside your cybersecurity Christmas cracker later this month to discover a riddle asking – What takes an hour to execute, requires no user interaction, and doesn’t generate any notifications? You might be spitting your sherry out when…
Glazed and Confused: Krispy Kreme Battles Cyberattack
Doughnut giant Krispy Kreme has disclosed a cyberattack that happened on 29 November and has led to significant operational disruptions, particularly affecting its online ordering system in parts of the United States. The doughnut chain disclosed the cyberattack in an 8-K…
FCC Responds to telecoms attack dubbed ‘worst in our nation’s history’
The FCC has released a statement calling for urgent actions to strengthen U.S. communications systems against cyberattacks in light of recent foreign intrusions, with ‘state-sponsored cyber actors from the People’s Republic of China’’ directly named as a perpetrator. In the…
Phishers Nabbed in International Sting
In a major international crackdown, Belgian and Dutch authorities, supported by Europol and Eurojust, have dismantled a phone phishing gang responsible for large-scale financial fraud across Europe. The operation resulted in eight arrests and significant seizures. Action Day Results Law…
Massive Data Breach Hits Senior Dating Website, Exposing Over 765,000 Users
The 40+ dating platform Senior Dating has been the victim of a data breach, compromising the personal information of 765,517 users. The breach, linked to an exposed Firebase database, has raised serious concerns about protecting sensitive data in online matchmaking…
Cybersecurity in the Digital Frontier: Reimagining Organizational Resilience
The digital landscape has become treacherous, and organizations must constantly reinvent their defensive strategies. Gone are the days of simple firewalls and basic security protocols. Today’s cyber challenges demand a revolutionary approach that combines strategic thinking, technological innovation, and human…
Massive Data Harvesting Operation Exploits AWS Customer Misconfigurations
Independent cybersecurity experts Noam Rotem and Ran Locar have exposed a sophisticated cyber operation targeting vulnerabilities in public websites, leading to unauthorized access to sensitive customer data, infrastructure credentials, and proprietary source code. The researchers collaborated with the AWS Fraud…
Ransomware Disrupts Operations at Leading Heart Surgery Device Maker
Artivion, a prominent manufacturer of heart surgery devices, disclosed a significant ransomware attack that has disrupted its operations. The incident involved the encryption and acquisition of company files, prompting Artivion to take immediate measures to contain the breach. According to…
50% of M&A Security Issues are Non-Malicious
More than half of M&A security incidents in 2024 were non-malicious, resulting instead from integration-induced investigation delays, policy and compliance challenges, and issues baselining internal tools, a report from ReliaQuest has revealed. These findings suggest that inherited assets present a…
Brand Impersonations Surge 2000% During Black Friday
Phishing scams impersonating major holiday brands like Walmart, Target, and BestBuy increased by more than 2000% during Black Friday week, new research from Darktrace has revealed. These findings come as part of a wider increase in phishing activity during the…
The Next Frontier: Predictions Driving Tech and Security in 2025
As we unveil the third edition of Information Security Buzz’s 2025 predictions, we are thrilled by the incredible response. In this installment, we dive even deeper into the evolving cybersecurity landscape, where advancements in AI, quantum computing, and cloud technologies…
Data Governance and the Mandate for Tougher Security in 2025
The challenges around data governance are evolving rapidly, driven by the rapid adoption of generative AI, stringent regulatory requirements, and heightened cybersecurity risks. As we approach 2025, organisations are realising that traditional approaches to data governance are no longer sufficient.…
The EU Cyber Resilience Act: Enhancing Digital Security in the AI Era
On 20 November 2024, the EU Cyber Resilience Act (CRA) was published in the Official Journal of the EU, kicking off the phased implementation of the CRA obligations. The European Union has introduced the Cyber Resilience Act to bolster the cybersecurity…
New Report Highlights Open Source Trends and Security Challenges
The Linux Foundation, in collaboration with the Laboratory for Innovation Science at Harvard, has unveiled a comprehensive study, “Census III of Free and Open Source Software – Application Libraries (Census III).” The report identifies the most widely used free and…
Developing Responsible AI in 2025: The Path to Trust and Compliance
Artificial intelligence (AI) is transforming industries at an unprecedented pace, offering solutions to some of the world’s most complex challenges. But with its immense potential come significant risks—bias, discrimination, data privacy breaches, and security vulnerabilities. Governments worldwide have enacted AI…
Kiteworks 2025 Cybersecurity Report Unveils Critical Trends and Strategies for Protecting Sensitive Data
As 2025 approaches, the cybersecurity landscape is set to face a new slew of challenges fueled by evolving threats and stringent regulations. According to Kiteworks’ newly released “2025 Forecast for Managing Private Content Exposure Risk” report, there are 12 transformative…
Avoiding cyber complacency as a small business
As a small business owner reading endless news stories about cyberattacks against well-known enterprise names, it can be easy to think it won’t happen to you. In reality, hackers don’t discriminate: businesses of all sizes can and do find themselves…
Critical Vulnerabilities Found in Veeam Service Provider Console
Two critical vulnerabilities (CVE-2024-42448 and CVE-2024-42449) have been identified in Veeam Service Provider Console (VSPC), prompting an urgent call for users to update their systems. According to Veeam’s latest security advisory, the vulnerabilities affect all builds of VSPC versions 7…
SmokeLoader Malware Targets Companies in Taiwan
A sophisticated cyberattack using the SmokeLoader malware targeted multiple industries in Taiwan in September 2024, new research from FortiGuard Labs has revealed. SmokeLoader is notorious for its versatility, advanced evasion techniques, and modular design, which allow it to perform a…
Navigating Australia’s Evolving Cyber Threat Landscape: Insights on AI-Driven Scams, Ransomware, and more
Cyber threats evolve rapidly in our current digital world—and Australia is no exception. AI-driven scams, ransomware, and social engineering tactics are only getting more sophisticated. In this interview with Gaidar Magdanurov, President of Acronis, we explore the latest trends in…
APIs and the Demise of Direct Database Access: A Safer World?
When they’re building an application, developers have to consider how that application will connect to the data sources that will help it function. To date, the most common options have been to build and use an API that connects to…
Anticipating Change: Key Cybersecurity Trends to Watch in 2025
Thanks to the fantastic response we received, we’re excited to continue our exploration of the evolving cybersecurity landscape. As we approach 2025, the challenges and threats facing businesses, governments, and individuals are becoming increasingly complex. Following our initial insights, we…
As Device Dependency Grows, So Do the Risks
It’s no stretch to say connected devices are taking over the world. In every sector and country, endpoints are driving newfound efficiencies inside the smart home, office, and warehouse. These devices – from sensors to smart meters and industrial controllers…
ImmuniWeb Debuts Global Internet Security Statistics Center for Research and Analysis
A rich resource of data from nearly 350 million security scans of Internet-facing assets is now freely accessible for industry and academic research, thanks to the ImmuniWeb Community Edition. Through this initiative, the global cybersecurity community, educational institutions, government agencies,…
SpyLoan Apps: The New Face of Financial Exploitation
The McAfee mobile research team has identified a significant global rise in predatory loan applications, commonly referred to as SpyLoan apps, which primarily target Android users. These applications, classified as potentially unwanted programs (PUP), utilize social engineering tactics to manipulate users…
Godot Gaming Engine Exploited to Spread Undetectable Malware
Check Point Research has discovered that cybercriminals are exploiting the popular Godot Engine to spread malware, bypassing detection by nearly all antivirus solutions. The new technique uses Godot’s scripting language, GDScript, to deliver malicious payloads through a loader dubbed “GodLoader,”…
Shop Smart, Stay Safe: Black Friday Edition
As Black Friday approaches, shoppers eagerly hunt for bargains online, but so do malicious actors. Cyber criminals are like pick-pockets, they go where the crowds are, so this high-traffic shopping season presents a smorgasbord of opportunities for malefactors to exploit…
Phishing Attacks Dominate Threat Landscape in Q3 2024
Spearphishing attacks with links and attachments increased in Q3 2024, accounting for 46% of security incidents, ReliaQuest’s Top Cyber Attacker Techniques report has revealed. Initial access methods like spear phishing were the most common MITRE ATT&CK techniques last quarter and have…
How to Back Up Proxmox Data with NAKIVO Backup & Replication
Proxmox Virtual Environment (VE) is a Debian Linux-based virtualization management platform with a customized kernel. Proxmox fully integrates the KVM hypervisor to enable deployment and efficient management of VMs using a user-friendly GUI. This is a free, open-source solution that…
What is CMMC 2.0? And Why is Compliance Crucial?
In an era of increasingly sophisticated cyber threats, the U.S. Department of Defense (DoD) has introduced the Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) to bolster the cybersecurity posture of its Defense Industrial Base (DIB). This updated framework aims to…
Growing Matrix Botnet Poses Escalating Global Threat
The Matrix botnet is expanding at an alarming rate, with nearly 35 million devices currently vulnerable to compromise. Researchers from Aqua Nautilus who uncovered the threat, warn that even a fraction of these devices falling into the botnet’s control could…
Rising Abuse of URL Rewriting in Phishing Attacks: A Growing Threat
In a concerning trend that has emerged in recent months, Perception Point has observed threat actors exploiting URL rewriting, a security feature designed to protect users from malicious links in emails. By manipulating the rewritten URLs, malefactors are able to…
VPN Vulnerabilities Drive Nearly 30% of Q3 Ransomware Attacks
Attackers leveraging vulnerabilities in Virtual Private Networks (VPNs) and exploiting weak passwords accounted for 28.7% of ransomware incidents in Q3 2024, according to Corvus Insurance’s latest Cyber Threat Report. Common credentials like “admin” and a lack of multi-factor authentication (MFA)…
Expert Cybersecurity Predictions for 2025: What Lies Ahead?
As the digital landscape evolves, so do the threats and challenges defining cybersecurity. With 2025 around the corner, ISB reached out to several experts to forecast transformative shifts in how businesses, governments, and individuals protect themselves against increasingly sophisticated cyberattacks.…
Ten Security and Privacy Compliance Requirements for All
The regulatory landscape for data privacy and cybersecurity continues to evolve, presenting significant challenges for organisations worldwide. Key developments include the proliferation of global data privacy laws, the emergence of AI-focused regulations, the implementation of the Cybersecurity Maturity Model Certification…
Malware Turns Trusted Avast Driver Into a Weapon
In a chilling discovery, Trellix Advanced Research Center has uncovered a malicious campaign that turns trusted security tools into instruments of attack. The malware manipulates Avast’s Anti-Rootkit driver (aswArPot.sys) to gain deep system access, disable protective measures, and take full…
Securing the Future: Why Your Business Needs to Prioritize API Security Now
In today’s digital-first world, APIs are the lifelines connecting different software applications, enabling seamless interactions and data exchange. As businesses increasingly adopt digital transformation strategies, the reliance on APIs has skyrocketed. However, this growing dependency comes with its own set…
2000 Un-Patched Palo Alto Firewalls Exploited Via PAN-OS Vulnerabilities
More than 2,000 Palo Alto Networks PAN-OS firewalls have been targeted following the disclosure and patching of two security vulnerabilities earlier this month—one of which is classified as critical. This was reported by the Shadowserver Foundation on 20 November. Warnings…
Why Relying on AI Providers Isn’t Enough to Protect Against Prompt Injection
The promise of AI is clear: tools such as OpenAI, Anthropic, and Google’s AI models are revolutionizing how businesses handle everything from customer service to data analysis. But with great power comes great responsibility, and along with that responsibility, a…
Australia Introduces Bill to Ban Kids from Social Media
The Australian Government has unveiled world-first legislation setting a minimum age of 16 for social media use, aiming to bolster online safety for young Australians. The Online Safety Amendment (Social Media Minimum Age) Bill 2024, introduced today, seeks to protect…
Unmasking WolfsBane: Gelsemium’s New Linux Weapon
ESET researchers have uncovered WolfsBane, a Linux cyberespionage backdoor attributed with high confidence to the Gelsemium advanced persistent threat (APT) group. This discovery is a major development, as it is the first public report of Gelsemium deploying Linux malware. The…
Avoiding Common API Security Mistakes
Application Programming Interfaces (APIs) have become the backbone of modern software development, enabling seamless communication between different systems. However, with this increased reliance on APIs comes a heightened need for robust security measures. Read on to explore the critical importance…
US-UK Armed Forces Dating Service Exposes Over 1 Million Records Online
A cybersecurity breach has exposed sensitive information from over 1.1 million records associated with Conduitor Limited’s Forces Penpals, a dating and social networking service for members of the US and UK armed forces and their supporters. The exposed database, discovered…
Attackers Hijack Misconfigured Servers for Live Sports Streaming
In a surprising discovery, Aqua Nautilus researchers have identified an emerging attack vector that leverages misconfigured servers to hijack resources for streaming sports events. Using honeypots designed to mimic real-world development environments, researchers uncovered how attackers exploited JupyterLab and Jupyter…
5 Questions CISOs Should Be Asking Regarding DSPM
The Data Security Posture Management (DSPM) market is on a meteoric rise, and CISOs are taking note. Gartner predicts that by 2026, one in five organizations will have invested in the technology (up from only 1% in 2022). But in…
Microsoft Vulnerability Poses Risk to Domain Control
A recently disclosed flaw in Microsoft Active Directory Certificate Services (ADCS), identified as CVE-2024-49019, could allow attackers to escalate privileges and gain control of a domain. The vulnerability, rated with a CVSS score of 7.8, is classified as an elevation-of-privilege…
T-Mobile Among Telecom Giants Hit by China-Linked Cyberattack Campaign
T-Mobile has confirmed its involvement in the recent wave of telecom network breaches, which have been attributed to a China-linked cyber threat group, Salt Typhoon. The malicious actor previously breached major telecom providers, including AT&T, Verizon, and Lumen Technologies, as…