Ransomware payments decreased by 35.82% year-over-year (YoY) in 2024, research from Chainalysis has revealed. The blockchain analytics company attributes much of this decrease to increased law enforcement actions, improved international collaboration, and a growing refusal of victims to pay. While,…
Category: Information Security Buzz
UK and US refuse to sign international AI declaration
The UK and the US have opted not to sign an international agreement on artificial intelligence (AI) at a global summit held in Paris. The declaration—endorsed by multiple countries including France, China, and India—commits to an “open,” “inclusive,” and “ethical”…
Securing the Endpoint: Automating Security and Identity Management for Better Digital Experiences
As IT environments grow increasingly complex, the necessity for advanced security measures at the endpoint level has never been more critical. This year will bring a wave of new challenges and opportunities in cybersecurity. Two prominent trends that will shape…
Bad Actors Target DeepSeek in LLMJacking Attacks
Cybercriminals are rapidly evolving their tactics for exploiting large language models (LLMs), with recent evidence showing a surge in LLMjacking incidents. Since Sysdig TRT first discovered LLMjacking in May 2024, it says attackers have continuously adapted, targeting new models such…
Black Duck Report: Inventory, Automation, and Endorsement
Organizations are increasingly prioritizing compliance due to recent regulatory requirements, such as those from the US Government regarding the sale of software to the US government and the EU’s Digital Operational Resilience Act (DORA). This was one of the findings…
Sectigo Debuts Post-Quantum Cryptography Testing Platform with Crypto4A
Sectigo has introduced Sectigo PQC Labs, a testing platform developed in collaboration with Crypto4A, a provider of quantum-safe Hardware Security Modules (HSMs). The platform aims to help companies prepare for the transition to post-quantum cryptography (PQC) by offering a secure…
The Next Y2K? How Past IT Challenges Shape Modern Cybersecurity
The software industry is full of surprises. From development to user experience, it`s a vast avenue of innovations, problem-solving, and security hurdles, driving to create a better and reliable digital landscape for everyone. We spoke with Paul Davis, Field CISO at JFrog,…
The RAT Pack Returns: ValleyRAT’s Devious Delivery Methods
Morphisec Threat Labs has uncovered cunning new delivery techniques used by ValleyRAT, a sophisticated multi-stage malware attributed to the Silver Fox APT. The malware, which primarily targets key roles in finance, accounting, and sales, has evolved with updated tactics, techniques,…
Why Cybersecurity Is Everyone’s Responsibility
For long-time cybersecurity industry veterans, we’re in an age that once we never thought possible; cybersecurity has moved from a backroom, “IT-only” relegation to a top-of-mind business objective. Right where we always thought it should be. However, this new era…
Qualys Report Raises Red Flags in DeepSeek-RI Security
A recent security analysis conducted by Qualys, using its AualysTotalAI solution, has raised significant concerns about DeepSeek-RI’s risks, particularly in enterprise and regulatory settings. The newly released large language model (LLM) has captured global attention with its promise of high…
Credential-stealing malware surges in 2024
Malware designed to steal credentials from password stores now accounts for 25% of all malware activity—a dramatic threefold increase in this type of threat. This was one of the findings of Picus Security’s annual cybersecurity analysis, The Red Report 2025.…
2024: The Year Data Security Took a Beating
2024 was a brutal year for data security, with some of the world’s biggest companies suffering breaches that exposed millions of sensitive records. The attacks were carried out by well-known cybercriminal groups, including Alphv/BlackCat, Qilin, and Rhysida, and shone a…
Upskilling the UK workforce for the AI revolution
As the UK government rolls out its ambitious AI Opportunity Action Plan to enable greater implementation of new technologies to boost economic growth, it faces a critical challenge: ensuring every industry is prepared for this seismic shift. Interestingly, both UK…
Tangerine Turkey: Cryptocurrency Mining Worm Unveiled in Global Campaign
A new threat actor, dubbed Tangerine Turkey by Red Canary’s intelligence team, is attracting attention thanks to its sophisticated use of a Visual Basic Script (VBScript) worm that delivers a crypto mining payload. First seen in November last year, Tangerine…
Smiths Group Discloses Security Breach
Smiths Group, a multinational engineering business, has disclosed a data breach. The company, which is based in London but employees more than 15,000 people in over 50 countries, published a filing to the London Stock Exchange (LSE) on Tuesday saying…
Threat Actors Exploit DeepSeek’s Popularity to Distribute Infostealers on PyPI
Malicious actors have exploited the rising popularity of DeepSeek AI to distribute two malicious infostealer packages through the Python Package Index (PyPI), impersonating legitimate developer tools for the AI platform. Researchers at Positive Technologies discovered and reported the campaign, which…
What is Acceptable Risk?
CISOs today must decide what is an acceptable risk to their organization. It’s an impossible equation to solve as enterprise attack surfaces are rapidly expanding, necessitating the need for a modernized approach to risk assessment. The most forward-thinking CISOs use…
Criminals Increase Attack Speed by 22%
The average time it takes for an attacker to move laterally after gaining initial access – known as breakout time – has plummeted to just 48 minutes, new research from ReliaQuest has revealed. These results represent a 2% increase in…
Forrester Report: The Complexities of Human-Element Breaches
Security leaders often have a narrow view of human-element breaches, thinking of them as either social engineering or human error, but there’s more to it than that. Breaches that start with a person can be divided into broader categories, including…
“Vámonos!” Declares DORA, but 43% of UK Financial Services Say “No”
On January 17TH, 2025, the EU’s Digital Operational Resilience Act (DORA) came into effect. However, a recent survey of 200 UK CISOs from Censuswide found that 43% of the UK financial services industry will miss this compliance deadline despite facing…
DoJ, Dutch Authorities Seize 39 Domains Selling Malicious Tools
The US Department of Justice (DoJ) and the Dutch National Police have seized 39 domains linked to a Pakistan-based cybercrime network operated by a group known as Saim Raza, or HeartSender. The sites sold malicious tools to transnational organized crime…
Regulating AI: Expert Insights on Compliance, Risk, and Security
As artificial intelligence (AI) continues to transform industries, governments worldwide are racing to implement regulations that ensure its safe and ethical use. From the EU AI Act to the White House’s Executive Order 14110 on AI, new frameworks set new…
Looking Back to Look Forward: 2024’s Top Email Threats
In the cybersecurity industry, we tend to look forward. And for good reason: cybersecurity is one of the fastest-moving, most dynamic fields out there. Staying in the fight against cybercriminals relies utterly on not just keeping up with the latest…
Building Resilience Against Zero-Day Threats in Third-Party Risk Management
Global zero-day incidents often reveal the vulnerability of organizations to risks originating from third-party resources. These moments are wake-up calls, highlighting the need for effective third-party risk management (TPRM). However, responding to such events is rarely straightforward. Identifying affected third…
API Supply Chain Attacks Surge, Exposing Critical Security Gaps
API attack traffic rose by 681% over a 12-month period, far outpacing the 321% increase in overall API call volume – a dramatic surge that highlights threat actors’ growing focus on APIs as attack vectors. This was one of the…
Cyberattack Crashes the Party Amid DeepSeek’s Meteoric Rise
Chinese artificial intelligence (AI) startup DeepSeek, which has taken the market by storm, has temporarily limited new user registrations following a large-scale cyberattack that disrupted its services. According to Reuters, the attack coincided with the company’s AI assistant becoming the…
Data Privacy Day 2025: Protecting Sensitive Information Has Never Been More Critical
Every year, 28 January marks Data Privacy Day, a global event dedicated to championing the importance of data protection and privacy in our increasingly digital, connected world. Established by the Council of Europe in 2006, this day commemorates the anniversary…
Attackers Exploit PDFs in Sophisticated Mishing Attack
In a newly discovered phishing campaign, malicious actors are using malicious PDF files to target mobile device users in potentially more than 50 countries. Dubbed the “PDF Mishing Attack,” the campaign exploits the widespread trust in PDFs as a secure…
GoDaddy’s Cybersecurity Called into Question
The Federal Trade Commission (FTC) has filed a complaint that GoDaddy has violated Section 5 of the FTC Act pertaining to “unfair methods of competition” through “unfair or deceptive acts or practices.” The complaint details how GoDaddy’s failure to implement…
A Strategic Approach to Container Security
Containerization technologies have transformed how applications are built, deployed, and managed. From speeding up production cycles to enabling seamless scalability, they have become the backbone of mission-critical enterprise applications. Gartner predicts that by 2027, 90% of global organizations will run…
The Unchanging Nature of Human Nature
At the conclusion of each calendar year, organizations and observers across all industries try to put forward predictions on what the new year might hold, and we at Thales were no exception. In the latest episode of our Thales Security…
VPN Usage Surges Amid Age Verification Laws on Adult Websites
Age verification laws for adult websites have led to a dramatic surge in VPN usage across the United States, research from vpnMentor’s Cybersecurity and Research Lab has revealed. The research brings into question the efficacy of these laws as users…
Connecting an LLM to Your Database Is Risky Business
Enterprises want it all, and they want it now – or at least within a few seconds. They want the benefits that GenAI can bring, like fast content and strategic advice based on data inputs. It’s not surprising that GenAI…
Can’t Start a Fire Without a Spark
Code Intelligence has started 2025 with a bang and captured the interest of the cybersecurity community by announcing ‘Spark,’ their new AI Test Agent, ahead of a launch party later this month. Influential AI-automated software testing company Code Intelligence has…
Mac Users Targeted: Fake Google Ads Exploit Homebrew in Malware Campaign
Homebrew, the popular open-source macOS and Linux package manager has become the latest victim of a malvertising campaign to distribute information-stealing malware. Security researcher Ryan Chenkie uncovered the scheme, which leverages fake Google ads to deliver malware that compromises user…
Why Healthcare Organisations Have to Act Decisively in the Shadow of New HIPAA Updates
The healthcare industry is at a pivotal moment. The recent updates to HIPAA represent the most significant overhaul in healthcare data privacy regulations in years. The changes are designed to address the growing need to protect sensitive patient information amidst…
The Murdoc Botnet: Reinventing Mirai to Exploit IoT Vulnerabilities
In a new and ongoing large-scale cyber campaign, Qualys researchers have uncovered a variant of the infamous Mirai botnet called the Murdoc Botnet. This variant exploits vulnerabilities in widely used AVTECH Cameras and Huawei HG532 routers, allowing malicious actors to…
Fortinet’s 2025 State of Cloud Security: Insights on Multi-Cloud Adoption, Security Challenges, and Future Trends
Despite the increase in cloud adoption, there`s a notable decrease in confidence in handling cloud threats in real-time. The skills shortage is also a major challenge with 95% being moderately to extremely concerned and 76% being directly impacted. These were…
Critical Vulnerability in ChatGPT API Enables Reflective DDoS Attacks
A concerning security flaw has been identified in OpenAI’s ChatGPT API, allowing malicious actors to execute Reflective Distributed Denial of Service (DDoS) attacks on arbitrary websites. This vulnerability, rated with a high severity CVSS score of 8.6, stems from improper…
Securing Health Data in 2025: The Rising Cybersecurity Challenges
Since 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the cornerstone of patient privacy. The act established standards for how healthcare organizations handle and share patient data, creating a framework for ensuring confidentiality. But the healthcare landscape…
Sneaky 2FA Kit Exposes Vulnerabilities in 2FA Security
Cybersecurity researchers from Sekoia have discovered a new Adversary-in-the-Middle (AiTM) phishing kit named “Sneaky 2FA,” targeting Microsoft 365 accounts. First discovered in December last year, this phishing kit has been active since at least October 2024 and is distributed as…
DORA Comes into Force: Experts Weigh In on Its Impact and Opportunities
Today marks the enforcement of the Digital Operational Resilience Act (DORA), a regulation aimed at strengthening the financial sector’s defenses against cyber threats and operational risks. With its focus on ICT risk management, incident reporting, and operational resilience, DORA sets…
Educate, Prepare, & Mitigate: The Keys to Unlocking Cyber Resilience
In 2024, consumers saw an array of cybersecurity incidents that impacted them directly, and in dramatic ways. From the Change Healthcare attack that impacted healthcare systems and prevented some from getting medication, to the more recent issues involving Ahold Delhaize…
O’Reilly 2025 Tech Trends: AI Skills Surge as Security Takes Center Stage
The 2025 technology landscape reveals a year of seismic shifts driven by surging interest in AI and an intensified focus on cybersecurity governance. Insights from the latest O’Reilly 2025 Technology Trends Report shed light on these pivotal changes shaping the…
DOJ, FBI Dismantle Malware Used by China-Backed Hackers in Global Operation
In an international effort, the US Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) have successfully eliminated a sophisticated malware threat known as “PlugX” from over 4,200 computers across the United States. The malware, used by bad…
Critical Infrastructure Embraces CISA CyHy Service
Critical infrastructure organization enrollment in CISA’s Cyber Hygiene (CyHy) service surged 201% between 1 August 2022, and 31 August 2024, a new report released by the US cybersecurity agency has revealed. The CISA CyHy service is a suite of free…
UK Government Seeking to ‘Turbocharge’ Growth Through AI
Earlier this week, UK Prime Minister Keir Starmer released a statement and made a subsequent speech unveiling and endorsing his government’s AI Opportunities Action Plan (AOAP). He declared Artificial intelligence (AI) to be “the defining opportunity of our generation” foreshadowing…
RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks
A sophisticated Python-based backdoor, potentially developed using AI, has been identified as a critical tool for RansomHub affiliates to infiltrate and maintain access to compromised networks. The discovery, made by Andrew Nelson, Principal Digital Forensics and Incident Response (DFIR) Consultant…
The Year of Proactive Defense: Staying Ahead of Threat Actors
As January reaches its midpoint, more cybersecurity experts have weighed in on what the year ahead holds for the industry. From the rapid advancement of artificial intelligence to evolving strategies in application security and a renewed focus on education and…
Critical RCE Vulnerability in Aviatrix Controller: Wiz Issues Urgent Patch Advisory
The Wiz Incident Response team is actively addressing multiple security incidents linked to CVE-2024-50603, a critical unauthenticated remote code execution (RCE) vulnerability in Aviatrix Controller. This flaw, rated the maximum CVSS score of 10.0, poses a severe risk of privilege…
AWS S3 Buckets Under Siege: New Ransomware Exploits SSE-C
Research from the Halcyon RISE Team has revealed that a ransomware actor dubbed “Codefinger” has launched a new campaign on Amazon S3 buckets, leveraging WS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data and render victims powerless to…
The Looming Crisis: Meta, Misinformation, and Public Trust
Meta’s jaw-dropping announcement that it is ending its third-party fact-checking program is likely to trigger increased activity from fake accounts and troll farms, which specialize in disseminating intentional falsehoods. The social media giant’s decision to end its fact-checking initiatives raises…
US Tightens AI Export Controls to Curb Adversarial Misuse
In a move to cement the US’s position as a global leader in artificial intelligence (AI), the Biden-Harris Administration has unveiled an Interim Final Rule on AI Diffusion. The policy hopes to improve national security and economic strength while ensuring…
HIPAA to Mandate Increased Cybersecurity Measures in Response to Escalating Number of Attacks
The U.S. Department of Health and Human Services (HSS) Office for Civil Rights (OCR) has published a Notice of Proposed Rulemaking (NPRM) proposing substantial cybersecurity requirements for all regulated entities and their business associates to be added to the HIPAA…
The AI Conundrum in Security: Why the Future Belongs to the Bold
When it comes to artificial intelligence, there’s no denying its transformative power. In fields ranging from medicine to logistics, AI has redefined the art of the possible. But in cybersecurity, AI is less a revolution and more an evolution—a tool…
AI in Cybersecurity: Thinking Like Hackers to Build Stronger Defenses
As we hit the two-year anniversary of the release of ChatGPT, we see that businesses across all sectors have started adopting generative AI tools to create content of all kinds. But many are discovering that these tools have capabilities that…
Rethinking Age Verification for Social Media: Privacy-Friendly Solutions for Safeguarding Kids
The digital landscape has become an integral part of our lives, and social media platforms are at its heart. While these platforms offer undeniable benefits in connecting people and fostering communities, they also pose significant risks, especially for children. Exposure…
Three Russian Nationals Indicted for Operating Cryptocurrency Mixers in Money Laundering Scheme
Three Russian nationals have been charged for their involvement in operating cryptocurrency mixing services Blender.io and Sinbad.io, according to an indictment unsealed on January 7 by a federal grand jury in the Northern District of Georgia. The charges stem from…
Medusind Data Breach Exposes Over 360,000 Individuals’ Healthcare Info
Medusind, a healthcare revenue cycle management provider, has disclosed a data breach that compromised the personal and health information of 360,934 people. The breach, which happened over a year ago, affirms the ongoing cybersecurity challenges in the healthcare sector. The…
Huge Changes Predicted for the Data Privacy Landscape
Although 2025 is now well underway, it’s not too late to ponder what the year will bring. The coming year is set to witness huge changes in the data privacy landscape, and there’s no harm in trying to stay ahead…
New Banshee Malware Targeting macOS Users Remained Undetected for Months
Check Point Research (CPR) has uncovered a sophisticated new version of the Banshee macOS Stealer malware, capable of stealing browser credentials, cryptocurrency wallets, and other sensitive data. This latest version, undetected for over two months, raises alarms for macOS users…
NFL Giants Green Bay Have Their Online Defense Breached
Whilst the four-time Superbowl Champions, The Green Packers, have rightly been drawing praise this season for their on-field defensive performances, the Organization’s online defense has been called into question following the disclosure of a significant data breach affecting thousands of…
Important Preventative Strategies for Avoiding and Recovering from Ransomware Threats
All organizations have their share of struggles when trying to scale successfully. Considering how competitive most industries have become, prioritizing operational agility is often critical and requires a high level of adaptability to gain and retain market share. However, while…
It’s Time Businesses Address the UK’s Cybersecurity Talent Shortage
UK Prime Minister Keir Starmer recently pledged to ‘Get Britain Working Again’. This comes as a new government whitepaper highlights a troubling rise in economic inactivity and stagnation in unemployment, currently hovering around 1.5 million. When we consider the UK’s…
VIPRE Security Shares Cybersecurity Trends for 2025
Last year saw increasingly sophisticated cybersecurity threats as malicious actors leveraged all forms of AI to create difficult-to-detect phishing attacks, deepfakes, and ransomware incidents. To counter these, organizations adopted AI-driven security solutions, including threat detection, automated incident response, and intelligent vulnerability…
Ivanti Warns of Active Exploitation of a Vulnerability in Connect Secure
Organizations are urged to act swiftly to address vulnerabilities impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways by sticking to the latest guidance from the vendor. Ivanti has released a critical security update addressing these vulnerabilities, identified as CVE-2025-0282…
Almost 8500 People Affected by Casio Data Leak
Casio has said nearly 8500 people were affected by a ransomware attack that compromised its servers on 5 October last year. The attack led to data leaks, including internal documents and personal information, but no credit card information was included…
E-commerce Faced Heightened Cybersecurity Threats During Holiday Season
While lucrative for e-commerce businesses, the holiday shopping season also brings a surge in cyber threats. A recent study by Liquid Web highlights a worrying trend: December, the most critical month for online retailers, sees a staggering 31% increase in…
Greece’s 2024 Cyber Threat Landscape: A Year of Increased and Varied Attacks
The year 2024 proved challenging for cybersecurity in Greece, with a significant surge in the volume and sophistication of cyberattacks. Ransomware attacks, Distributed Denial-of-Service (DDoS) attacks, and Advanced Persistent Threats (APTs) all significantly disrupted businesses, government services, and critical infrastructure.…
Moxa Devices Vulnerable to Cyberattacks, Threatening Industrial Networks
Critical vulnerabilities discovered in Moxa’s industrial networking devices could allow privilege escalation and OS command injection, exposing critical infrastructure to potential cyberattacks. In a security advisory, Moxa said that affected models include EDR and TN series routers widely used in…
When is a RAT, not a RAT?
Have you heard the story about the RAT that pretended to be a RAT? If not, you’d better sit down for this one. There’s a RAT in my kitchen Last month, a malicious package, ethereumvulncontracthandler, was identified on the npm…
The Future of Cybersecurity: Leveraging AI SOC Analysts to Combat Evolving Threats
At Information Security Buzz, we deliver the latest cybersecurity news and insights, engaging with various companies to understand their goals, objectives, and contributions to advancing cybersecurity. In this interview, we spoke with Kamal Shah, Co-founder and CEO of Prophet Security,…
US Treasury Sanctions Chinese Tech Firm Over Links to State-Sponsored Attacks
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Beijing-based Integrity Technology Group (Integrity Tech) for its involvement in cyber intrusion campaigns targeting US entities. Integrity Tech has been linked to Flax Typhoon, a Chinese…
FireScam Malware Campaign Highlights Rising Threat to Mobile Users
The ubiquity of mobile applications has created a perfect storm for bad actors, offering ample opportunities to exploit unsuspecting users. One of the latest instances is FireScam, a sophisticated malware that targets Android devices. Disguised as a fake “Telegram Premium”…
High-Severity Vulnerability Discovered in Nuclei: What You Need to Know
An engineering team from Wiz has discovered a critical vulnerability in Nuclei, a popular open-source security tool developed by ProjectDiscovery. The vulnerability, assigned as CVE-2024-43405, enables malicious actors to bypass the tool’s signature verification process, potentially enabling arbitrary code execution.…
Diving into Azure Lateral Movement with Pass-the-PRT
One of the most concerning attack methods I’ve come across recently is ‘Pass-the-PRT.’ It’s not the most likely of cyberattacks, but if successful – your organization’s security is in trouble. And that’s precisely what makes it dangerous—it leverages legitimate authentication…
2024 Year in Review (Part 2)
July AT&T announced (in a financial filing) the discovery of a data breach dating back to 2023 that affects almost every AT&T customer. “The stolen data also includes call records of customers with phone service from other cell carriers that…
Navigating the Cybersecurity Landscape: Insights on AI, FTC Safeguards, and Building Resilient Cyber Cultures
With the rise of sophisticated cyber threats and the growing complexity of the digital landscape, entities are in a desperate battle to stay ahead of potential risks. Information security is no longer just an IT issue but a critical component…
2024 Year in Review (Part 1)
As 2023 came to a close, it was easy to predict that breaches would continue to dominate the cybersecurity news. However, the scale of the events, specifically the Change Healthcare breach eclipsed all others for the year. The other event…
Phishing Report Findings Call for a Fundamental Shift in Organizational Approaches to Defense
SlashNext has released its 2024 Phishing Intelligence Report, a comprehensive study identifying and analyzing the vectors most exploited by cybercriminals in the past year. The findings and how the data is trending form recommendations for organizations on the best areas…
CISA and EPA Warn Water Facilities to Secure Exposed HMIs
The US government is imploring water and wastewater organizations to secure internet-exposed human-machine interfaces (HMIs) that provide access to industrial machines against cyberattacks. Unauthorized access to these HMIs can allow malicious actors to view sensitive information and disrupt operations. HMIs…
Data Sovereignty in a Cloud-Driven World is not a Given
Data sovereignty refers to the principle that digital information can remain subject to the laws and governance structures of the country where it is collected or stored. But this, like most things related to the cloud, is more complicated than…
These Six Innovations Have the Potential to Transform Cybersecurity in 2025
The cybersecurity landscape evolves at a breakneck pace, with new, sophisticated threats challenging even the most intricate defenses. As 2025 approaches, several groundbreaking innovations are poised to redefine how businesses and individuals secure their digital assets and respond to emerging…
Nine Updated Security Measures for the Modern Smart Home
Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…
The Hidden Risks of Virtual Desktop Infrastructure (VDI) and How to Mitigate Them
Virtual Desktop Infrastructure (VDI) is white hot. Just ask Fortune Business Insights, which reports that the VDI market size will grow from $15.61 billion in 2024 to $80.82 billion by 2032, with a CAGR of 22.8%. One catalyst behind this adoption…
9 Updated Security Measures for the Modern Smart Home
Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…
Cybersecurity in 2025 – A New Era of Complexity
As the world steps into 2025, the cybersecurity landscape is set to evolve at an unprecedented pace, driven by the convergence of emerging technologies, sophisticated threats, and tightening regulations. The fourth edition of this report delves into the critical trends…
Hackers Target Global Sporting Events with Fake Domains to Steal Logins
New research from Palo Alto Networks has revealed that cybercriminals are taking advantage of high-profile sporting events to conduct scams, phishing, and malware attacks through suspicious domain registrations and other malicious activities. Domain Abuse Surges During Paris Olympics For example,…
It’s Beginning to look a lot like Grinch bots
Almost three-quarters (71%) of UK consumers believe that nefariously named ‘Grinch bots’ are ruining Christmas by acquiring all the best presents. This was one of the findings of new research from Imperva, a Thales company. Grinch bots are automated programs…
Not Every Gift Comes from Santa Claus: Avoiding Cyber Scams This Holiday Season
The holidays are a time for joy, connection, and giving, but amidst the festive cheer lies a growing cyber threat that’s anything but jolly. As we fill our online shopping carts with gifts for loved ones, scammers are busy crafting…
How to Defend Against High Cyberthreat Activity During the Holidays
Imagine if Santa’s workshop were brought down by a ransomware attack in December — children around the world would be disappointed. A multitude of holidays between Thanksgiving and New Year’s creates an optimal opportunity for cybercriminals, with government reports confirming…
SpartanWarriorz Phish Kits: Uncovered
Cybercriminals are using phish kits developed by authoring group SpartanWarriorz to target over 300 global brands, new research from Fortra has revealed. Attackers using the kits tend to target financial institutions in North America and Europe, retail, delivery services, and…
No User Interaction, no Alerts: Azure MFA Cracked in an Hour
If you look inside your cybersecurity Christmas cracker later this month to discover a riddle asking – What takes an hour to execute, requires no user interaction, and doesn’t generate any notifications? You might be spitting your sherry out when…
Glazed and Confused: Krispy Kreme Battles Cyberattack
Doughnut giant Krispy Kreme has disclosed a cyberattack that happened on 29 November and has led to significant operational disruptions, particularly affecting its online ordering system in parts of the United States. The doughnut chain disclosed the cyberattack in an 8-K…
FCC Responds to telecoms attack dubbed ‘worst in our nation’s history’
The FCC has released a statement calling for urgent actions to strengthen U.S. communications systems against cyberattacks in light of recent foreign intrusions, with ‘state-sponsored cyber actors from the People’s Republic of China’’ directly named as a perpetrator. In the…
Phishers Nabbed in International Sting
In a major international crackdown, Belgian and Dutch authorities, supported by Europol and Eurojust, have dismantled a phone phishing gang responsible for large-scale financial fraud across Europe. The operation resulted in eight arrests and significant seizures. Action Day Results Law…
Massive Data Breach Hits Senior Dating Website, Exposing Over 765,000 Users
The 40+ dating platform Senior Dating has been the victim of a data breach, compromising the personal information of 765,517 users. The breach, linked to an exposed Firebase database, has raised serious concerns about protecting sensitive data in online matchmaking…
Cybersecurity in the Digital Frontier: Reimagining Organizational Resilience
The digital landscape has become treacherous, and organizations must constantly reinvent their defensive strategies. Gone are the days of simple firewalls and basic security protocols. Today’s cyber challenges demand a revolutionary approach that combines strategic thinking, technological innovation, and human…
Massive Data Harvesting Operation Exploits AWS Customer Misconfigurations
Independent cybersecurity experts Noam Rotem and Ran Locar have exposed a sophisticated cyber operation targeting vulnerabilities in public websites, leading to unauthorized access to sensitive customer data, infrastructure credentials, and proprietary source code. The researchers collaborated with the AWS Fraud…
Ransomware Disrupts Operations at Leading Heart Surgery Device Maker
Artivion, a prominent manufacturer of heart surgery devices, disclosed a significant ransomware attack that has disrupted its operations. The incident involved the encryption and acquisition of company files, prompting Artivion to take immediate measures to contain the breach. According to…