A recent investigation by Bitsight TRACE has uncovered several critical 0-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. These vulnerabilities are substantial real-world threats, with the potential for exploitation by malicious actors, leading to severe…
Tag: Information Security Buzz
The Rise of API Security Automation: Defending the Digital Frontlines with AI and Machine Learning
APIs (Application Programming Interfaces) are the backbone of modern digital services, driving the seamless flow of data and functionality between applications. From enabling quick social media logins to processing payments and connecting complex systems, APIs have revolutionized how businesses operate…
CISA Urges Action as Attackers Exploit Critical Systems Using Basic Tactics
The Cybersecurity and Infrastructure Security Agency (CISA) has once again raised alarms about the ongoing exploitation of operational technology (OT) and industrial control systems (ICS) across critical infrastructure sectors. The warning comes amid an active investigation into a cybersecurity incident…
Kia Vulnerability Enables Remote Access to Millions of Cars Using Just a License Plate
Cybersecurity researchers identified critical vulnerabilities in Kia vehicles, revealing that attackers could remotely control cars using only a license plate number. The vulnerabilities were first identified in June this year and have since been patched, but the potential impact has…
Mozilla Faces Legal Complaint Over Firefox’s New “Privacy Preserving” Tracking Feature
Non-profit privacy watchdog noyb (None of Your Business) has filed a formal complaint against Mozilla, accusing the tech company of enabling a controversial tracking feature in its Firefox browser without user consent. The feature, dubbed “Privacy Preserving Attribution” (PPA), was…
The AI-Cybersecurity Paradox: How AI is Revolutionizing Defenses While Empowering Hackers
In the rapidly evolving digital security landscape, artificial intelligence (AI) has emerged as both a powerful ally and a formidable adversary. As we navigate through 2024, the cybersecurity industry finds itself at a critical juncture, grappling with what experts call…
Dell’s Security Woes Deepen: Attackers Strike Twice in One Week
Hackers have allegedly carried out a second Dell data breach within a week, compromising sensitive internal files via Atlassian tools. Allegedly, data from Jira, Jenkins, and Confluence has been exposed. Dell is currently investigating the initial breach. On 19 September…
CISA Releases Guide to Empower Software Buyers in Creating a Secure Tech Ecosystem
Recognizing that cyber criminals increasingly exploit software vulnerabilities, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken the lead with a new resource for software customers—the “Secure by Demand Guide.” The Guide is part of CISA’s ongoing effort to…
PECB Conference 2024: A Global Forum for IT, Security, and Privacy Professionals
The PECB Conference 2024 is set to take place from 30 September to 3 October at the Van der Valk Hotel Breukelen in Amsterdam. This annual event will gather global experts, thought leaders, and professionals to explore the latest trends…
Cybersecurity in E-Commerce
In any organization, regardless of the industry or the size, cybersecurity is one of the most pressing concerns to handle. Some companies, especially those that store and manage large amounts of sensitive data and those that operate primarily in the…
Underfunding and Leadership Gaps Weaken Cybersecurity Defenses
Despite cyber risk growing at an alarming rate, a recent global study from Trend Micro, highlights that many organizations are failing to implement adequate cybersecurity measures due to a lack of strategic leadership and investment. Key Findings of the Report…
Necro Trojan Strikes Google Play Again, Infecting Popular Apps
In a troubling development, the Necro Trojan has resurfaced on Google Play, infecting popular applications and reaching millions of Android devices worldwide. Kaspersky’s cybersecurity researchers discovered the Necro malware in various apps, including some available on official app stores like…
Generative AI Fuels New Wave of Cyberattacks, HP Warns
Attackers are employing AI-generated scripts, leveraging malvertising to distribute rogue PDF tools, and embedding malware in image files. These developments mark a significant shift in the threat landscape, accelerating the frequency and complexity of cyberattacks. This was revealed by HP’s…
UN Report on Governing AI for Humanity – Key Recommendations and Insights
The United Nations (UN) Secretary-General’s High-level Advisory Body on Artificial Intelligence (HLAB-AI) released a comprehensive report titled “Governing AI for Humanity,” which proposes global governance mechanisms for Artificial Intelligence (AI). The report is based on extensive consultations and presents a…
Red Canary’s Midyear Threat Report Highlights Infostealer Surge Targeting macOS Devices
Red Canary has released a midyear update to its 2024 Threat Detection Report, revealing key cybersecurity trends and evolving threats. Among the most notable findings is the rise of Atomic Stealer, an infostealer targeting macOS devices, which entered the top…
Privacy and API security: What’s at stake?
APIs (Application Programming Interface) have assumed an indispensable role in the digital space, facilitating seamless communication and data exchange between an array of software applications and services. They underpin our daily interactions, from ordering meals through food delivery apps to…
Analysis of ENISA’s 2024 Threat Landscape Report: Key Takeaways and Implications
The European Union Agency for Cybersecurity (ENISA) has released its annual Threat Landscape report for 2024, providing crucial insights into the evolving cybersecurity challenges facing the EU. Here are the key takeaways: Prime Threats Remain Consistent Denial of Service (DDoS)…
FTC Sounds the Alarm on Social Media Spying on Children and Teenagers
Social media and video streaming services (SMVSSs), including Amazon, Alphabet-owned YouTube, Meta’s Facebook and TikTok, are engaging in a “vast surveillance of users” to profit off their personal information. The report also raised concerns about the lack of meaningful privacy…
7 Steps to Perform a Cyber Attack Simulation
We can learn a lot from soccer and American football teams when it comes to attack and defense strategies. Players analyze the opposing team’s strategy to identify weak spots, adapt their offensive orchestration accordingly, and, most importantly, practice, practice, practice.…
U.S. Justice Department Disrupts China-Backed Botnet Targeting Thousands of Devices
In a major cyber operation, the U.S. Justice Department announced the successful takedown of a botnet controlled by People’s Republic of China (PRC) state-sponsored hackers. The botnet, dubbed “Raptor Train” by Black Lotus Labs, spanned over 200,000 devices globally. It…
Emerging Technologies in Cloud Security for Enhanced Protection Against Cyber Threats
Some industry experts highlight the unique cybersecurity needs of cloud-based operations, noting that protecting sensitive data differs from traditional on-premises networks. While emerging technologies haven’t changed the ongoing battle between cybersecurity professionals and criminals, they have raised the stakes, making…
More Hezbollah Devices Explode in Lebanon, Heightening Fears of Regional Conflict
Tensions in Lebanon soared on Wednesday as handheld radios used by Hezbollah fighters exploded across the country’s south, marking the deadliest day since cross-border skirmishes with Israel began nearly a year ago, reported Reuters. The explosions left 20 dead and…
Hezbollah Pager Attack: A Wake-up Call to Tech Manufacturers to Secure their Supply Chains?
In a coordinated and deadly attack, pagers used by hundreds of Hezbollah members exploded almost simultaneously across Lebanon on Tuesday, killing at least nine people and injuring thousands more, according to officials. Both Hezbollah and the Lebanese government have pointed…
Cyware Joins Coalition for Secure AI (CoSAI) to Advance Safe and Ethical AI Technologies
Cyware joins CoSAI to help drive the development of secure and ethical AI technologies, addressing the urgent need for AI safety amid today’s rapidly evolving cyber threats. Cyware, a provider of threat intelligence management, security collaboration, and orchestrated response, has…
Deadly Pager Explosions in Lebanon Linked to Possible Supply Chain Attack
Yesterday, Reuters reported that multiple explosions involving communication devices used by Hezbollah resulted in at least nine deaths and over 3000 injuries across Lebanon. Among those wounded were Hezbollah fighters, medics, and Iran’s ambassador to Lebanon, Mojtaba Amani, who sustained…
Phishing Campaigns Surge with New Header Refresh Technique, Targeting Financial and Government Sectors
In 2024, Unit 42 researchers observed a sharp increase in large-scale phishing campaigns using a novel technique involving the HTTP response header. Between May and July, they detected approximately 2,000 malicious URLs daily, which directed web browsers to refresh or…
TfL Employees Face In-Person Identity Verification Following Cyberattack
Nearly two weeks after a significant cybersecurity breach, Transport for London (TfL) announced on its employee hub that its 30,000 employees must attend in-person appointments to verify their identities and reset their passwords. This move follows a full system reset…
The Human Element in Non-Human Identity Security: Bridging the Gap in Modern Cybersecurity
In today’s cybersecurity landscape, Non-Human identities (NHIs) are exploding in number. For every human user, there may be hundreds or even thousands of NHIs running in the background. Traditional access management tools were designed primarily for human users, and they…
Hunters International Claims Breach of ICBC London
The ransomware group, Hunters International, has reportedly claimed responsibility for a breach at the London branch of the Industrial and Commercial Bank of China (ICBC), one of China’s largest state-owned banks. According to the group, they have exfiltrated 6.6 terabytes…
Researchers Discover New Variant of TrickMo Banking Trojan
Cleafy’s Threat Intelligence team has uncovered a new variant of the TrickMo Android banking Trojan. Initially classified as an unknown malware sample, deeper analysis revealed it as a TrickMo variant with some new anti-analysis features, making detection more difficult and…
New Environmental Policies and Practices Raise Unexpected Cybersecurity Challenges
Sound environmental policies are critical to protect the planet’s future. In response, companies have developed technologies and practices to help their respective industries and clients. While green innovation is necessary, the devices and systems have caused unexpected cybersecurity challenges. What…
Is Your Business Ready for the Quantum Cybersecurity Threat?
Imagine a world where even the strongest cybersecurity defenses crumble in seconds. This isn’t a sci-fi plot; it’s a looming reality with the rise of quantum computing—a technology that could revolutionize industries and dismantle current encryption methods. Quantum computing is…
Android TV Box Malware, Vo1d, Infects Over a Million Devices Worldwide
Cybersecurity experts at Doctor Web have uncovered a massive malware campaign targeting Android-based TV boxes. Dubbed Android.Vo1d, the newly discovered malware has infected nearly 1.3 million devices across 197 countries, making it one of the most widespread infections of its…
Fortinet Confirms Data Breach
Cybersecurity firm Fortinet has confirmed that user data was stolen from its Microsoft SharePoint server and posted on a hacking forum earlier today, according to a report by BleepingComputer. The threat actor, known as “Fortibitch,” shared credentials to what is…
How Can Individuals Protect Themselves from Ransomware Attacks?
Ten years ago, ransomware actors mainly worked alone or in small groups, targeting home computer users through spam emails to encrypt personal files and demand relatively small amounts of cryptocurrency for their safe return. Today, many ransomware gangs operate like…
Lazarus Group Targets Developers with Fake Coding Tests
A fresh wave of attacks tied to North Korea’s infamous Lazarus Group is targeting software developers through fraudulent job recruitment schemes. These attacks are part of the VMConnect campaign, first uncovered in August last year. Malicious actors pretend to be…
DragonRank SEO Manipulator is Targeting Asia and Europe
A new cyber threat dubbed “DragonRank” is actively targeting countries across Asia and Europe. Discovered by Cisco Talos, the sophisticated campaign leverages malicious tools like PlugX and BadIIS to exploit web application services and manipulate SEO rankings. DragonRank primarily focuses…
Behind the Power of the Cloud
It takes up to 7,500 liters of water to manufacture a single pair of jeans. All the work required to soften denim to a texture that consumers will buy, as well as the addition of sandblasting to distress them to…
Unveiling Hidden APIs and Securing Vulnerabilities in the Healthcare Sector
Healthcare is no longer just about treating the sick; it’s about safeguarding their most personal information. Unfortunately, today, a slew of threats target this sector, including ransomware, phishing, API vulnerabilities, and the significant complexities of securing interconnected systems and supply…
RansomHub Serves Up LaZagne
New Attack Technique Using TDSSKiller and LaZagne Disables EDR The RansomHub ransomware group has debuted a novel attack strategy, using a combination of tools to disable endpoint detection and response (EDR) systems and steal credentials. This is a change in…
The Biggest Cyber Warfare Attacks in Global Geopolitics
As governments, businesses, and organizations increasingly rely on digital systems, cyberattacks have become more systematic and widespread. These coordinated attacks can disrupt a country’s operations just as much as a physical offensive, making it crucial to understand their possible impact.…
Strengthening Healthcare Cybersecurity: Lessons from Recent Supplier Attacks
The global healthcare system has become increasingly integrated with third-party medical suppliers in recent years. These suppliers are vital in providing essential services, medical equipment, pharmaceuticals, and digital tools that healthcare organizations depend on to operate efficiently. However, while these…
Payment Gateway Breach Exposes 1.7 Million Customers
A significant data breach at the payment gateway provider SLIM CD has exposed over 1.7 million customers to the risk of identity theft and financial fraud. The breach, which took place between August 2023 and June 2024, compromised sensitive personal…
The Role of SIEM in Regulatory Compliance
Organizations of every size and in every industry must adhere to stringent compliance standards. Regulations like the Health Insurance Portability and Accountability Act (HIPAA), the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS)…
Advanced surveillance is key to countering emerging global threats
Almost 80 years ago, George Orwell coined the phrase “Big Brother is watching you” in his dystopian thriller, 1984. Even he couldn’t image the advances and capabilities in surveillance that are prevalent today. Geopolitical unrest and extremist ideology are a…
Predator Spyware Resurfaces: Renewed Threats and Global Implications
Intellexa’s Predator spyware is back. After facing sanctions and exposure by the US government, the scourge appeared to decline. However, recent findings from Insikt Group, the threat research arm of cyber security company Recorded Future, reveal that Predator’s infrastructure is…
Prevalent, Indigocube Security Partner to Elevate Third-Party Risk Management Solutions in SA
Prevalent, a third-party risk management solutions provider, has partnered with Indigocube Security, a cybersecurity consultancy in SA. This collaboration aims to enhance the way organizations in SA manage and mitigate third-party risks, offering comprehensive solutions that enhance security, resilience, and…
Tropic Trooper Expands Targeting: Middle East Government Entity Hit in Strategic Cyber Attack
Kaspersky has discovered that an advanced persistent threat (APT) group, Tropic Trooper, also known as KeyBoy and Pirate Panda, has been linked to a series of targeted attacks on a government entity in the Middle East. This is a strategic…
Bitdefender Debuts Security Solution for YouTube Content Creators and Influencers
Bitdefender has unveiled Bitdefender Security for Creators, a service specifically designed for digital content producers, online creative professionals, and social media influencers who are prime targets for account takeovers, fraud, and other cybercrimes. Initially the new offering protects YouTube accounts with…
A Deep Dive into IoT Communication Protocols
The Internet of Things (IoT) has revolutionized the way devices interact and share information. IoT communication protocols are at the heart of this technological advancement – the rules and standards that enable diverse devices to communicate effectively. This article explores…
New PyPI Supply Chain Attack Technique Puts 22,000 Packages at Risk
A newly discovered PyPI hijack technique called “Revival Hijack” has been exploited in the wild, posing a significant threat to thousands of Python packages. Identified by JFrog’s security research team, the method takes advantage of a loophole in the PyPI…
Double Trouble: DOJ Exposes Russian AI-Powered Disinformation
The US Department of Justice has disrupted a covert Russian government-sponsored influence operation targeting audiences within its borders and other nations. The operation, dubbed “Doppelganger,” involved using influencers, AI-generated content, and paid social media advertisements to spread disinformation aimed at…
The Six Most Dangerous New Threats Security Teams Need to Know About
The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks. As the technology evolves, many organisations prioritise AI innovation at…
Phishing Remains Top Cyber Threat Despite Drop in Incidents
Phishing remains the most common cyber threat, representing 37% of incidents in Q3 2024. However, incidents of credential exposure have increased to almost 89%, raising concerns about data security risks across industries, according to the latest report by ReliaQuest on…
Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility
Cisco has warned of multiple critical vulnerabilities in its Smart Licensing Utility, potentially enabling unauthenticated, remote attackers to collect sensitive information or gain administrative control over the software. The vulnerabilities, identified as CVE-2024-20439 and CVE-2024-20440, can be found in several…
Can Every Business Afford to Be a Target?
As malicious actors increasingly create cybercriminal business models, small and medium-sized businesses (SMBs) face a changing cyber threat landscape. Today, being a cybercriminal no longer requires advanced technical skills, expanding the number of attackers and their attack capabilities. Unlike larger…
Webinar: Unveiling Hidden APIs and Securing Vulnerabilities in the Healthcare Sector
The healthcare industry is a magnet for cybercriminals, and it’s easy to see why. First, the treasure trove of personal health information (PHI) is incredibly valuable—from detailed medical histories to sensitive financial data, this information isn’t just gold—it’s like striking…
Explaining the OWASP API Security Top 10
Any company that employs APIs can tell you that they’re the glue that holds all things together, the hub that simplifies and scales digital growth. However, not all can tell you how to protect them. And that’s a problem. Thankfully,…
SLOW#TEMPEST Campaign Targets Chinese Users with Advanced Tactics
A sophisticated cyber campaign, dubbed SLOW#TEMPEST, has been uncovered by the Securonix Threat Research team, targeting Chinese-speaking users. The attack, characterized by the deployment of Cobalt Strike payloads, managed to evade detection for over two weeks, demonstrating the malicious actors’…
The MadRadar Hack Can Cause Autonomous Cars to Malfunction and Hallucinate
Self-driving cars come closer to being a reality every day. Many vehicles already have autonomous features, but several challenges remain. Cybersecurity shortcomings are among the most concerning, and a recent experiment dubbed “MadRadar” heightens these worries. How Does the MadRadar…
North Korean Threat Actor Exploits Chrome Zero-Day
A North Korean threat actor has been found exploiting a zero-day vulnerability in Chromium, now designated as CVE-2024-7971. The exploit, which enables remote code execution (RCE), is being attributed with high confidence to a North Korean group known as Citrine…
SQL Injection Vulnerability Could Enable Attackers to Bypass Airport Security
Cybersecurity researchers discovered a vulnerability in the Known Crewmember (KCM) system, a TSA program that allows airline pilots and flight attendants to bypass security screening. The flaw, which could potentially compromise the safety of millions of air travelers, was found…
Malware Masquerading as Palo Alto GlobalProtect Tool Targets Middle East Users
Users in the Middle East are being targeted by sophisticated threat actors deploying malware disguised as the Palo Alto GlobalProtect tool, Trend Micro has revealed. The malware employs a two-stage infection process, leveraging advanced command-and-control (C&C) infrastructure to evade detection…
FBI: RansomHub Hits Over 200 Entities Since Feb
RansomHub, previously known as Cyclops and Knight, has quickly gained traction, targeting over 210 victims across US critical infrastructure sectors. This ransomware-as-a-service (RaaS) model has been active since February 2024. These include water and wastewater, information technology, government services and…
Top Cost-Effective Cybersecurity Strategies for SMBs
Safeguarding your small or medium-sized business against escalating cyber threats is essential, yet the steep costs of sophisticated security measures can be daunting. This guide delves into smart, budget-friendly cybersecurity tactics designed to fortify your business without draining your finances.…
Meeting the New Cyber Insurance Requirements
In the event of a cyberattack, companies – especially small to mid-sized businesses – often face losses so great they risk pulling their business under. With the number of ransomware attacks, phishing schemes, and data breaches on the rise, it…
MacOS Version of HZ Rat Backdoor Discovered Targeting DingTalk and WeChat Users
In June 2024, cybersecurity researchers from Kaspersky identified a new macOS version of the HZ Rat backdoor, marking the first time this malware has been observed targeting macOS users. The backdoor was found attacking users of the enterprise messaging platform…
Watchdog Criticizes FBI for Inadequate Digital Storage and Destruction Practices
The FBI needs to improve its handling of electronic media designated for destruction at its facilities, according to a scathing audit from the Justice Department’s Inspector General, released publicly last week. . The memo, issued by DOJ Inspector General Michael…
Cyberattacks on UK Law Firms Surge by 77% Amid Rising Ransomware Threat
The number of successful cyber attacks on UK law firms has soared by 77% over the past year, rising from 538 incidents to 954, according to a recent study. The increase is attributed to the lucrative nature of law firms…
MFP security: How Can Resellers Ensure Customers Have The Proper Protection?
Decades ago, office printers had one job: to present documents or images in a paper format. However, with technology evolving rapidly, the role of the office printer has changed drastically. Now, printers are multifunctional, allowing workers to copy, scan, send, or…
Why Companies Need Real-Time Compliance
The need for real-time compliance has never been more critical. As regulatory landscapes evolve and become more complex, organizations face mounting pressure to ensure they remain compliant at all times. This shift from traditional, periodic audits to continuous, real-time compliance…
Global Field Service Management Provider Exposes Nearly 32 Million Documents Online
Nearly 32 million documents, including invoices, contracts, and agreements, were exposed online by ServiceBridge, a global field service management provider. Cybersecurity researcher Jeremiah Fowler made the discovery, reporting the unprotected database to WebsitePlanet. The database contained 31.5 million records, including…
Flights Disrupted at Seattle-Tacoma Airport Due to Possible Cyberattack
Seattle-Tacoma International Airport (SEA-TAC) appears to have been targeted by a cyberattack, with critical systems experiencing widespread internet outages for the third consecutive day, according to officials from the Port of Seattle. The disruptions, which began early on Saturday, have…
Stealthy Linux Malware “sedexp” Exploits udev Rules for Persistence and Evasion
Stroz Friedberg, a risk management firm under Aon, has identified a sophisticated malware strain targeting Linux systems. Dubbed “sedexp,” the malware exploits udev rules to maintain persistence and evade detection. According to researchers Zachary Reichert, Daniel Stein, and Joshua Pivirotto,…
Discovering The Importance of Cybersecurity Advisory Boards (CABs)
In today’s rapidly evolving digital landscape, Cybersecurity Advisory Boards (CABs) are crucial in helping organizations navigate the complexities of today’s digital landscape. By bringing together industry leaders, CABs provide strategic insights, foster collaboration, and ensure cybersecurity strategies stay ahead of…
Ransomware Attacks, Demands, and Payments Rise in Q2
In Q2 2024, new ransomware groups, including PLAY, Medusa, RansomHub, INC Ransom, BlackSuit and some additional lesser-known factions, led a series of attacks that eclipsed the first quarter of this year by 16% and the second quarter of 2023 by…
Prism Infosec Debuts Red Team Engagement Service
Prism Infosec, an independent cybersecurity consultancy,has introduced PULSE testing service. The service aims to help entities that may not have the resources to dedicate to a full-scale red team exercise and assess their defense capabilities against real-world threats. The company…
The Evolving Landscape of Identity and Access Management in 2024
In the digital age, where cyber threats are increasingly sophisticated and data privacy regulations are more stringent than ever, Identity and Access Management (IAM) has become a cornerstone of organizational security. As we navigate through 2024, the IAM landscape continues…
FIDO Alliance Releases Authenticate 2024 Agenda
The FIDO Alliance has announced its agenda today for Authenticate 2024, the only industry conference dedicated to all aspects of user authentication. The event will be held from 14 to 16 October 2024 at the Omni La Costa Resort and Spa in Carlsbad,…
Qilin Targets Chrome-Stored Credentials in “Troubling” New Attack
The Qilin ransomware group, already infamous for its devastating attacks, has now been caught stealing credentials stored in Google Chrome browsers. This new tactic could amplify the chaos typically associated with ransomware breaches, spreading the impact far beyond the initial…
Millions of Office and Hotel RFID Smart Cards Vulnerable to Instant Cloning Through Hidden Backdoor
Researchers from Quarkslab have uncovered critical vulnerabilities in the latest variant of MIFARE Classic compatible cards. Despite being touted as a secure alternative, the FM11RF08S card, developed by Shanghai Fudan Microelectronics, has been found to contain a hardware backdoor, among…
Navigating the Challenges of AI in Software Development: A Call to Action to Comply with the EU AI Act
In today’s rapidly evolving software development landscape, Artificial Intelligence (AI) and Machine Learning (ML) have emerged as significant threat vectors. Organizations worldwide are witnessing a surge in targeted attacks aimed at software developers, data scientists, and the infrastructure supporting the…
Extortion Campaign Targets 110,000 Domains Using Exposed AWS Files
A sophisticated cloud extortion campaign has compromised over 110,000 domains by exploiting misconfigured Amazon Web Services (AWS) environment variable (.env) files. By scanning for exposed .env files on unsecured web applications, threat actors were able to obtain AWS Identity and…
Innovative Phishing Campaign Targets Mobile Users with PWAs
In a new twist on phishing tactics, ESET analysts have uncovered a series of sophisticated campaigns targeting mobile users by leveraging Progressive Web Applications (PWAs). This use of PWAs, which are essentially websites functioning as standalone apps, sets this phishing…
US Intelligence Agencies Warn of Iranian Election Influence Efforts
In a joint statement, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) have warned about heightened Iranian efforts to interfere in the upcoming US elections.…
FlightAware Notifies Users of Data Security Incident
FlightAware, a provider of real-time flight tracking information, has informed users of a data security incident that may have exposed personal information. The company is taking precautionary measures by requiring all potentially impacted users to reset their passwords. The incident,…
Cyberattack Forces Microchip Technology to Scale Back Amid Global Chip Race
Microchip Technology Inc. announced Tuesday that it had been targeted by a cyberattack, prompting the US chipmaker to shut down some systems and reduce its operations. According to a regulatory filing, Microchip, a key supplier to the US defense industry,…
10 Strategies for Safely Migrating a Data Center on a Limited Budget
Data centers have become integral to modern companies, considering the amount of information necessary for operations. These systems remain in place most of the time, but your business could determine it is time to move. How can you ensure safety…
5 Emerging Malware Variants You Must Be Aware Of
The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…
Ransom Denied: Cyber Insurance Claims Shrink as Businesses Opt for DIY Recovery
Claims on cyber insurance have dropped by more than a third between 2022 and 2024, despite more organizations than ever having this type of cover. This was revealed in Databarracks’ Data Health Check – an annual survey of 500 UK…
Ransomware’s Record Year: 2024 Earnings Soar Amid Overall Cybercrime Dip
In a year marked by significant shifts in the cybercrime landscape, 2024 is on track to become the highest-grossing year for ransomware, even as overall illicit activity on the blockchain has declined by nearly 20% year-to-date. This trend highlights the…
Ransomware Gangs Introduce New EDR-Killing Tool
Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…
National Public Data Admits to Breach Leaking Millions of Social Security Numbers
Background check provider National Public Data (NPD) has confirmed a data breach after hackers leaked a stolen database containing millions of Social Security numbers and other sensitive information. The compromised data reportedly includes names, email addresses, phone numbers, Social Security…
Pool your Cybersecurity Resources to Build The Perfect Security Ecosystem
Cybersecurity has never been something to set once and leave running in the background—it is a constantly evolving landscape. While the migration of data and applications to the cloud provides numerous business benefits, many organisations struggle to secure their networks…
Cybersecurity in Healthcare: A New Era of Regulation, Incentives, and Patient Safety
Over the last few years, attacks against the healthcare sector have been severe and widespread, targeting sensitive patient data and critical medical operations. The 2020 ransomware attack on Universal Health Services, which led to the shutdown of systems across 400…
Taming Identity Sprawl With a Least Privilege Approach
Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…
China-linked Attackers Target Russian Govt Entities
Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…
Russian Sentenced to 40 Months for Selling Stolen Data on Dark Web
A Moscow-based Russian national, Georgy Kavzharadze, has been sentenced to 40 months in federal prison for selling stolen financial information on the dark web marketplace known as Slilpp. The US Attorney’s Office for the District of Columbia announced that Kavzharadze,…
Malware Loaders Dominate Cybersecurity Threats in 2024
Malware loaders are a significant threat in the cybersecurity landscape, with nearly 40% of all malware observed in critical security incidents involving these specialized tools. Among the most prevalent loaders are “SocGholish,” “GootLoader,” and “Raspberry Robin,” which have been frequently…
When Disinformation Floods the Internet, Preserving Truth Requires Proper Equipment
The World Wide Web is the greatest tool for sharing information humankind has ever created. Unfortunately, lies and fake news spread over the Internet just as well. It is so easy for disinformation to proliferate online that it takes the…