Tag: Information Security Buzz

Cybersecurity in E-Commerce

In any organization, regardless of the industry or the size, cybersecurity is one of the most pressing concerns to handle. Some companies, especially those that store and manage large amounts of sensitive data and those that operate primarily in the…

Necro Trojan Strikes Google Play Again, Infecting Popular Apps

In a troubling development, the Necro Trojan has resurfaced on Google Play, infecting popular applications and reaching millions of Android devices worldwide. Kaspersky’s cybersecurity researchers discovered the Necro malware in various apps, including some available on official app stores like…

Generative AI Fuels New Wave of Cyberattacks, HP Warns

Attackers are employing AI-generated scripts, leveraging malvertising to distribute rogue PDF tools, and embedding malware in image files. These developments mark a significant shift in the threat landscape, accelerating the frequency and complexity of cyberattacks. This was revealed by HP’s…

Privacy and API security: What’s at stake?

APIs (Application Programming Interface) have assumed an indispensable role in the digital space, facilitating seamless communication and data exchange between an array of software applications and services. They underpin our daily interactions, from ordering meals through food delivery apps to…

7 Steps to Perform a Cyber Attack Simulation

We can learn a lot from soccer and American football teams when it comes to attack and defense strategies. Players analyze the opposing team’s strategy to identify weak spots, adapt their offensive orchestration accordingly, and, most importantly, practice, practice, practice.…

Hunters International Claims Breach of ICBC London

The ransomware group, Hunters International, has reportedly claimed responsibility for a breach at the London branch of the Industrial and Commercial Bank of China (ICBC), one of China’s largest state-owned banks. According to the group, they have exfiltrated 6.6 terabytes…

Researchers Discover New Variant of TrickMo Banking Trojan

Cleafy’s Threat Intelligence team has uncovered a new variant of the TrickMo Android banking Trojan. Initially classified as an unknown malware sample, deeper analysis revealed it as a TrickMo variant with some new anti-analysis features, making detection more difficult and…

Is Your Business Ready for the Quantum Cybersecurity Threat?

Imagine a world where even the strongest cybersecurity defenses crumble in seconds. This isn’t a sci-fi plot; it’s a looming reality with the rise of quantum computing—a technology that could revolutionize industries and dismantle current encryption methods. Quantum computing is…

Fortinet Confirms Data Breach

Cybersecurity firm Fortinet has confirmed that user data was stolen from its Microsoft SharePoint server and posted on a hacking forum earlier today, according to a report by BleepingComputer. The threat actor, known as “Fortibitch,” shared credentials to what is…

Lazarus Group Targets Developers with Fake Coding Tests

A fresh wave of attacks tied to North Korea’s infamous Lazarus Group is targeting software developers through fraudulent job recruitment schemes. These attacks are part of the VMConnect campaign, first uncovered in August last year. Malicious actors pretend to be…

DragonRank SEO Manipulator is Targeting Asia and Europe

A new cyber threat dubbed “DragonRank”  is actively targeting countries across Asia and Europe. Discovered by Cisco Talos, the sophisticated campaign leverages malicious tools like PlugX and BadIIS to exploit web application services and manipulate SEO  rankings. DragonRank primarily focuses…

Behind the Power of the Cloud

It takes up to 7,500 liters of water to manufacture a single pair of jeans. All the work required to soften denim to a texture that consumers will buy, as well as the addition of sandblasting to distress them to…

RansomHub Serves Up LaZagne

New Attack Technique Using TDSSKiller and LaZagne Disables EDR The RansomHub ransomware group has debuted a novel attack strategy, using a combination of tools to disable endpoint detection and response (EDR) systems and steal credentials. This is a change in…

The Biggest Cyber Warfare Attacks in Global Geopolitics

As governments, businesses, and organizations increasingly rely on digital systems, cyberattacks have become more systematic and widespread. These coordinated attacks can disrupt a country’s operations just as much as a physical offensive, making it crucial to understand their possible impact.…

Payment Gateway Breach Exposes 1.7 Million Customers

A significant data breach at the payment gateway provider SLIM CD has exposed over 1.7 million customers to the risk of identity theft and financial fraud. The breach, which took place between August 2023 and June 2024, compromised sensitive personal…

The Role of SIEM in Regulatory Compliance

Organizations of every size and in every industry must adhere to stringent compliance standards. Regulations like the Health Insurance Portability and Accountability Act (HIPAA), the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS)…

A Deep Dive into IoT Communication Protocols

The Internet of Things (IoT) has revolutionized the way devices interact and share information. IoT communication protocols are at the heart of this technological advancement – the rules and standards that enable diverse devices to communicate effectively. This article explores…

Double Trouble: DOJ Exposes Russian AI-Powered Disinformation

The US Department of Justice has disrupted a covert Russian government-sponsored influence operation targeting audiences within its borders and other nations. The operation, dubbed “Doppelganger,” involved using influencers, AI-generated content, and paid social media advertisements to spread disinformation aimed at…

The Six Most Dangerous New Threats Security Teams Need to Know About

The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks. As the technology evolves, many organisations prioritise AI innovation at…

Phishing Remains Top Cyber Threat Despite Drop in Incidents

Phishing remains the most common cyber threat, representing 37% of incidents in Q3 2024. However, incidents of credential exposure have increased to almost 89%, raising concerns about data security risks across industries, according to the latest report by ReliaQuest on…

Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility

Cisco has warned of multiple critical vulnerabilities in its Smart Licensing Utility, potentially enabling unauthenticated, remote attackers to collect sensitive information or gain administrative control over the software.  The vulnerabilities, identified as CVE-2024-20439 and CVE-2024-20440, can be found in several…

Can Every Business Afford to Be a Target?

As malicious actors increasingly create cybercriminal business models, small and medium-sized businesses (SMBs) face a changing cyber threat landscape. Today, being a cybercriminal no longer requires advanced technical skills, expanding the number of attackers and their attack capabilities. Unlike larger…

Explaining the OWASP API Security Top 10

Any company that employs APIs can tell you that they’re the glue that holds all things together, the hub that simplifies and scales digital growth. However, not all can tell you how to protect them. And that’s a problem. Thankfully,…

SLOW#TEMPEST Campaign Targets Chinese Users with Advanced Tactics

A sophisticated cyber campaign, dubbed SLOW#TEMPEST, has been uncovered by the Securonix Threat Research team, targeting Chinese-speaking users. The attack, characterized by the deployment of Cobalt Strike payloads, managed to evade detection for over two weeks, demonstrating the malicious actors’…

North Korean Threat Actor Exploits Chrome Zero-Day

A North Korean threat actor has been found exploiting a zero-day vulnerability in Chromium, now designated as CVE-2024-7971. The exploit, which enables remote code execution (RCE), is being attributed with high confidence to a North Korean group known as Citrine…

FBI: RansomHub Hits Over 200 Entities Since Feb

RansomHub, previously known as Cyclops and Knight, has quickly gained traction, targeting over 210 victims across US critical infrastructure sectors. This ransomware-as-a-service (RaaS) model has been active since February 2024. These include water and wastewater, information technology, government services and…

Top Cost-Effective Cybersecurity Strategies for SMBs

Safeguarding your small or medium-sized business against escalating cyber threats is essential, yet the steep costs of sophisticated security measures can be daunting. This guide delves into smart, budget-friendly cybersecurity tactics designed to fortify your business without draining your finances.…

Meeting the New Cyber Insurance Requirements

In the event of a cyberattack, companies – especially small to mid-sized businesses – often face losses so great they risk pulling their business under. With the number of ransomware attacks, phishing schemes, and data breaches on the rise, it…

Why Companies Need Real-Time Compliance

The need for real-time compliance has never been more critical. As regulatory landscapes evolve and become more complex, organizations face mounting pressure to ensure they remain compliant at all times. This shift from traditional, periodic audits to continuous, real-time compliance…

Discovering The Importance of Cybersecurity Advisory Boards (CABs)

In today’s rapidly evolving digital landscape, Cybersecurity Advisory Boards (CABs) are crucial in helping organizations navigate the complexities of today’s digital landscape. By bringing together industry leaders, CABs provide strategic insights, foster collaboration, and ensure cybersecurity strategies stay ahead of…

Ransomware Attacks, Demands, and Payments Rise in Q2

In Q2 2024,  new ransomware groups, including PLAY, Medusa, RansomHub, INC Ransom, BlackSuit and some additional lesser-known factions, led a series of attacks that eclipsed the first quarter of this year by 16% and the second quarter of 2023 by…

Prism Infosec Debuts Red Team Engagement Service

Prism Infosec, an independent cybersecurity consultancy,has introduced PULSE testing service. The service aims to help entities that may not have the resources to dedicate to a full-scale red team exercise and assess their defense capabilities against real-world threats.  The company…

FIDO Alliance Releases Authenticate 2024 Agenda

The FIDO Alliance has announced its agenda today for Authenticate 2024, the only industry conference dedicated to all aspects of user authentication. The event will be held from 14 to 16 October 2024 at the Omni La Costa Resort and Spa in Carlsbad,…

Innovative Phishing Campaign Targets Mobile Users with PWAs

In a new twist on phishing tactics, ESET analysts have uncovered a series of sophisticated campaigns targeting mobile users by leveraging Progressive Web Applications (PWAs). This use of PWAs, which are essentially websites functioning as standalone apps, sets this phishing…

FlightAware Notifies Users of Data Security Incident

FlightAware, a provider of real-time flight tracking information, has informed users of a data security incident that may have exposed personal information. The company is taking precautionary measures by requiring all potentially impacted users to reset their passwords. The incident,…

5 Emerging Malware Variants You Must Be Aware Of

The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…

Ransomware Gangs Introduce New EDR-Killing Tool

Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…

Taming Identity Sprawl With a Least Privilege Approach

Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…

China-linked Attackers Target Russian Govt Entities

Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…

Malware Loaders Dominate Cybersecurity Threats in 2024

Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…