Last year saw increasingly sophisticated cybersecurity threats as malicious actors leveraged all forms of AI to create difficult-to-detect phishing attacks, deepfakes, and ransomware incidents. To counter these, organizations adopted AI-driven security solutions, including threat detection, automated incident response, and intelligent vulnerability…
Tag: Information Security Buzz
Ivanti Warns of Active Exploitation of a Vulnerability in Connect Secure
Organizations are urged to act swiftly to address vulnerabilities impacting Ivanti Connect Secure, Policy Secure, and ZTA Gateways by sticking to the latest guidance from the vendor. Ivanti has released a critical security update addressing these vulnerabilities, identified as CVE-2025-0282…
Almost 8500 People Affected by Casio Data Leak
Casio has said nearly 8500 people were affected by a ransomware attack that compromised its servers on 5 October last year. The attack led to data leaks, including internal documents and personal information, but no credit card information was included…
E-commerce Faced Heightened Cybersecurity Threats During Holiday Season
While lucrative for e-commerce businesses, the holiday shopping season also brings a surge in cyber threats. A recent study by Liquid Web highlights a worrying trend: December, the most critical month for online retailers, sees a staggering 31% increase in…
Greece’s 2024 Cyber Threat Landscape: A Year of Increased and Varied Attacks
The year 2024 proved challenging for cybersecurity in Greece, with a significant surge in the volume and sophistication of cyberattacks. Ransomware attacks, Distributed Denial-of-Service (DDoS) attacks, and Advanced Persistent Threats (APTs) all significantly disrupted businesses, government services, and critical infrastructure.…
Moxa Devices Vulnerable to Cyberattacks, Threatening Industrial Networks
Critical vulnerabilities discovered in Moxa’s industrial networking devices could allow privilege escalation and OS command injection, exposing critical infrastructure to potential cyberattacks. In a security advisory, Moxa said that affected models include EDR and TN series routers widely used in…
When is a RAT, not a RAT?
Have you heard the story about the RAT that pretended to be a RAT? If not, you’d better sit down for this one. There’s a RAT in my kitchen Last month, a malicious package, ethereumvulncontracthandler, was identified on the npm…
The Future of Cybersecurity: Leveraging AI SOC Analysts to Combat Evolving Threats
At Information Security Buzz, we deliver the latest cybersecurity news and insights, engaging with various companies to understand their goals, objectives, and contributions to advancing cybersecurity. In this interview, we spoke with Kamal Shah, Co-founder and CEO of Prophet Security,…
US Treasury Sanctions Chinese Tech Firm Over Links to State-Sponsored Attacks
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned Beijing-based Integrity Technology Group (Integrity Tech) for its involvement in cyber intrusion campaigns targeting US entities. Integrity Tech has been linked to Flax Typhoon, a Chinese…
FireScam Malware Campaign Highlights Rising Threat to Mobile Users
The ubiquity of mobile applications has created a perfect storm for bad actors, offering ample opportunities to exploit unsuspecting users. One of the latest instances is FireScam, a sophisticated malware that targets Android devices. Disguised as a fake “Telegram Premium”…
High-Severity Vulnerability Discovered in Nuclei: What You Need to Know
An engineering team from Wiz has discovered a critical vulnerability in Nuclei, a popular open-source security tool developed by ProjectDiscovery. The vulnerability, assigned as CVE-2024-43405, enables malicious actors to bypass the tool’s signature verification process, potentially enabling arbitrary code execution.…
Diving into Azure Lateral Movement with Pass-the-PRT
One of the most concerning attack methods I’ve come across recently is ‘Pass-the-PRT.’ It’s not the most likely of cyberattacks, but if successful – your organization’s security is in trouble. And that’s precisely what makes it dangerous—it leverages legitimate authentication…
2024 Year in Review (Part 2)
July AT&T announced (in a financial filing) the discovery of a data breach dating back to 2023 that affects almost every AT&T customer. “The stolen data also includes call records of customers with phone service from other cell carriers that…
Navigating the Cybersecurity Landscape: Insights on AI, FTC Safeguards, and Building Resilient Cyber Cultures
With the rise of sophisticated cyber threats and the growing complexity of the digital landscape, entities are in a desperate battle to stay ahead of potential risks. Information security is no longer just an IT issue but a critical component…
2024 Year in Review (Part 1)
As 2023 came to a close, it was easy to predict that breaches would continue to dominate the cybersecurity news. However, the scale of the events, specifically the Change Healthcare breach eclipsed all others for the year. The other event…
Phishing Report Findings Call for a Fundamental Shift in Organizational Approaches to Defense
SlashNext has released its 2024 Phishing Intelligence Report, a comprehensive study identifying and analyzing the vectors most exploited by cybercriminals in the past year. The findings and how the data is trending form recommendations for organizations on the best areas…
CISA and EPA Warn Water Facilities to Secure Exposed HMIs
The US government is imploring water and wastewater organizations to secure internet-exposed human-machine interfaces (HMIs) that provide access to industrial machines against cyberattacks. Unauthorized access to these HMIs can allow malicious actors to view sensitive information and disrupt operations. HMIs…
Data Sovereignty in a Cloud-Driven World is not a Given
Data sovereignty refers to the principle that digital information can remain subject to the laws and governance structures of the country where it is collected or stored. But this, like most things related to the cloud, is more complicated than…
These Six Innovations Have the Potential to Transform Cybersecurity in 2025
The cybersecurity landscape evolves at a breakneck pace, with new, sophisticated threats challenging even the most intricate defenses. As 2025 approaches, several groundbreaking innovations are poised to redefine how businesses and individuals secure their digital assets and respond to emerging…
Nine Updated Security Measures for the Modern Smart Home
Modern smart homes offer unparalleled convenience, but there’s a catch. Security vulnerabilities can leave you open to cyberattacks, letting criminals “see” far more than they could glimpse through your window curtains—like your bank account number. Taking the following nine measures…