As Cybersecurity Awareness Month unfolds with the continuing theme from 2023, “Secure Our World,” it’s a timely reminder of the importance of taking daily actions to safeguard your organization’s digital ecosystem. In an increasingly interconnected world, where devices, data, and…
Tag: Information Security Buzz
TrickMo’s Latest Trick – Stealing PINs and Unlock Patterns
Mobile device and app security firm Zimperium has discovered a new capability in the notorious banking Trojan TrickMo. Some of the samples the company analyzed are able to steal a device’s unlock pattern or PIN. This new feature enables the…
Veeam Vulnerability Actively Exploited by Ransomware Gangs
NHS England’s National Cyber Security Operations Centre (CSOC) has issued a high-severity cyber alert in response to the active exploitation of a critical vulnerability, CVE-2024-40711, in Veeam’s Backup & Replication software. This alert follows Veeam’s security bulletin from September, which…
Check Point’s threat index emphasizes the shift towards AI-driven malware tactics in the current cyber landscape
Several interesting trends are emerging in the cybersecurity landscape, particularly the emergence of artificial intelligence (AI)-driven malware, as well as the ongoing dominance of ransomware threats. Threat actors have started using GenAI as part of their attack infrastructure, which illustrates…
OpenAI says bad actors are using ChatGPT to write malware, sway elections
Cybercriminals are increasingly exploiting OpenAI’s model, ChatGPT, to carry out a range of malicious activities, including malware development, misinformation campaigns, and spear-phishing. A new report revealed that since the beginning of 2024, OpenAI has disrupted over 20 deceptive operations worldwide,…
4 Frightening Things Coming for Security this Season
As we strive to “Secure Our World” this Cybersecurity Awareness Month, a few irrepressible haunts keep rearing their ugly heads. Here are some of the most malicious monsters hiding under our proverbial cybersecurity beds and what we need to know…
What is Digital Assurance and Why It’s Crucial in Today’s Business Landscape
Today’s businesses must navigate evolving technologies, customer expectations, and security threats. Digital assurance is emerging as a pillar of this transformation, ensuring that enterprises can mitigate risks, deliver reliable systems, and create long-term business value. Digital assurance is a key…
The “Mongolian Skimmer” Uses Unicode to Conceal Its Malicious Intent
Researchers at Jscrambler have uncovered a new skimming campaign dubbed the “Mongolian Skimmer.” This malware, initially detected through intelligence shared by Sansec, distinguishes itself through its use of unusual Unicode characters to obfuscate JavaScript code. Although at first glance, this…
31 Million Records Exposed Online by Sports Technology Company TrackMan
A whopping almost 32 million records and around 110 TB of data belonging to tech users from Trackman were left exposed to the internet. The database exposed user names, email addresses, device information, IP addresses, and security tokens. They were…
The Hidden Price of DevSecOps: How Security Tasks Are Sapping Developer Productivity and Jeopardizing Competitive Edge
Developers are spending significantly more time, and companies are spending 28K per developer each year on security-related tasks, such as manual application scan reviews, context switching, and secrets detection, among other things. This was revealed by JFrog, the Liquid Software company…
Palo Alto Networks Warns of Exploitable Firewall Hijack Vulnerabilities
Palo Alto Networks has issued an urgent advisory for its customers following the discovery of multiple critical vulnerabilities in its Expedition tool, which assists with firewall configuration migration. The vulnerabilities are as follows: CVE-2024-9463 has a score of 9.9. It’s…
No Silver Bullet, Just Smarter Security: More Expert Tips for Cyber Defense
We had such an overwhelming response to our first article, which shared industry expert opinions during Cybersecurity Awareness Month, that we’ll be publishing another few articles with more expert insights over the next few weeks. Following on with the theme…
Disinformation Campaign Targets Moldova Ahead of Presidential Elections and EU Membership Referendum
A cyber-enabled disinformation campaign, dubbed Operation MiddleFloor, is targeting Moldova’s government and educational sectors, according to Check Point Research. The campaign began in early August and appears to have been aimed at influencing the country’s presidential elections on 20 October,…
Password Basics: Why Mastering Fundamentals Is Crucial in Today’s Complex Cybersecurity Landscape
It’s often said, but worth repeating: In cybersecurity, we simply cannot afford to neglect the basics. Focus has increasingly shifted to the ‘scarier’ threats posed by Artificial Intelligence (AI) and other disruptive technologies, and many have been overlooking the basics…
Report Highlights Escalating Security Challenges Amid Swift AI Adoption
In the dynamic world of software development, security challenges are advancing at a rapid pace. Black Duck’s 2024 “Global State of DevSecOps” report examines the evolving trends and concerns in application security, drawing insights from a survey of over 1,000…
Lego Hacked by Crypto-Scammers
Early Saturday morning, Lego’s website briefly fell victim to a crypto scam that advertised a fake Lego coin token. The scam appeared as a banner on the homepage, positioned below an advertisement for Lego’s new Fortnite collaboration, which features building…
From Zero Trust to Full Trust: How Remote Browser Isolation Shields Against Emerging Threats
Cyber threats are ubiquitous and constantly evolving and companies are in dire need of robust defense mechanisms to protect their digital assets and ensure business continuity. Remote Browser Isolation (RBI) technology has emerged as a pivotal solution, offering a unique…
American Water Hit by Cyberattack
American Water, the largest publicly traded water and wastewater utility in the United States, has had to shut down certain systems following a cyberattack. The attack impacted the company’s online customer portal, MyWater, and paused billing services. In its 8-K…
Gorilla Botnet Launches Over 300,000 DDoS Attacks
A newly active botnet, dubbed “Gorilla Botnet,” has unleashed a gargantuan wave of cyberattacks this past September, according to the NSFOCUS Global Threat Hunting System. During a surge in activity from September 4 to September 27, Gorilla Botnet issued more…
VIPRE Introduces All-in-one Endpoint EDR+MDR Package for 24/7 Managed Security
VIPRE Security Group, a cybersecurity, privacy, and data protection company, has debuted a combined VIPRE Endpoint EDR+MDR package. This managed protection package provides organisations of all sizes with cost-effective, advanced, and around-the-clock endpoint security. For managed service providers (MSPs), this…
New DDoS Attack Vector Discovered in CUPS, Exposing 58,000+ Vulnerable Devices Online
Akamai researchers have identified a critical vulnerability in the Common Unix Printing System (CUPS) that could allow malicious actors to initiate powerful distributed denial-of-service (DDoS) attacks with minimal resources. Approximately 58,000 exposed devices are potentially at risk, posing a serious…
CloudSEK Debuts Free Deep Fake Detection Technology
CloudSEK, a provider of AI-driven cybersecurity solutions, has debuted Deep Fake Detection Technology, which is now available for free. The company says this initiative is part of its commitment to providing society with resources to combat cybercrime. Advanced Deep Fake…
Check Point Software Acquires Cyberint
Check Point Software, a cybersecurity solutions provider, has acquired Cyberint Technologies, a company specializing in external risk management solutions. This marks Check Point’s third startup acquisition within the past year. Through this acquisition, Check Point will enhance its Security Operations…
The Future of Network Access Control: Transitioning to Universal ZTNA
The way enterprises secure their networks is undergoing a dramatic shift. Traditional Network Access Control (NAC) solutions, once the cornerstone of access security, need help to keep pace with the complexities and dynamism of modern network environments. A recent Gartner…
Black Kite Research Reveals 80% of Manufacturing Companies Face Critical Cyber Vulnerabilities
A staggering 80% of manufacturing companies have critical vulnerabilities, putting them at heightened risk of cyberattacks. This was one of the findings of Back Kite’s 2024 report, The Biggest Third-Party Risks in Manufacturing. Black Kite is a third-party cyber risk…
Strengthening Security Posture Through People-First Engagement
As attackers continue to find new ways to profit from vulnerabilities, organizations of all sizes face an ever-present threat. With attacks becoming more frequent and businesses growing increasingly desensitized to these risks, the importance of having a comprehensive, proactive response…
China-aligned CeranaKeeper Makes a Beeline for Thailand
Cybersecurity firm ESET has identified a new China-aligned threat actor, dubbed “CeranaKeeper,” operating across Southeast Asia, with a primary focus on Thailand. CeranaKeeper has been carrying out widespread data exfiltration campaigns since early 2022, primarily targeting governmental institutions. The findings…
CISA Warns of Critical Vulnerabilities Switches Used in Critical Manufacturing
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two critical vulnerabilities in Optigo Networks’ ONS-S8 Spectra Aggregation Switch, a key component in critical infrastructure systems. These vulnerabilities, which affect all versions of the switch up…
Small Steps, Big Impact: Expert Tips for Building a Stronger Cyber Defense
This year’s Cybersecurity Awareness Month theme, “Secure Our World,” emphasizes the importance of simple yet powerful measures everyone can take to protect their businesses, data, and loved ones. While there is no silver bullet to safeguard against all cyber threats,…
Passkeys and Cybersecurity Awareness: A New Era of Business Security
This year, Cybersecurity Awareness Month is themed “Secure Our World,” a stark reminder that simple measures can protect businesses from online threats. The week emphasizes four key strategies: using strong passwords and password managers, turning on multifactor authentication (MFA), recognizing…
More Evil Corp Actors Exposed, Including LockBit Affiliate
In a significant move against one of the world’s most notorious cybercrime groups, the UK has sanctioned 16 individuals linked to Evil Corp, a criminal organization with ties to the Russian state. Among those newly exposed is a key affiliate…
Ambulances Still Diverted as UMC Faces Ongoing Cybersecurity Incident
University Medical Center (UMC) is still grappling with the aftermath of a ransomware attack that occurred last Thursday. The attack caused a widespread IT outage and forced the diversion of emergency and non-emergency patients to nearby facilities. While some services…
Book Review: “Premier CISO – Board & C-Suite” by Michael S. Oberlaender
In his latest work, Premier CISO -Board & C-Suite, Michael S. Oberlaender delivers a comprehensive guide for aspiring and current Chief Information Security Officers (CISOs) navigating the complex landscape of cybersecurity leadership. This book, the third in Michael’s series on…
Three Iranian Cyber Actors Indicted for Election Interference and Hacking Campaign
The U.S. Department of Justice (DOJ) has indicted three Iranian nationals linked to the Islamic Revolutionary Guard Corps (IRGC) for orchestrating a cyberattack aimed at influencing the 2024 US presidential election. The indictment, unsealed today, charges Masoud Jalili, Seyyed Ali…
Critical Infrastructure at Risk: Vulnerabilities Discovered in Automatic Tank Gauging
A recent investigation by Bitsight TRACE has uncovered several critical 0-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. These vulnerabilities are substantial real-world threats, with the potential for exploitation by malicious actors, leading to severe…
The Rise of API Security Automation: Defending the Digital Frontlines with AI and Machine Learning
APIs (Application Programming Interfaces) are the backbone of modern digital services, driving the seamless flow of data and functionality between applications. From enabling quick social media logins to processing payments and connecting complex systems, APIs have revolutionized how businesses operate…
CISA Urges Action as Attackers Exploit Critical Systems Using Basic Tactics
The Cybersecurity and Infrastructure Security Agency (CISA) has once again raised alarms about the ongoing exploitation of operational technology (OT) and industrial control systems (ICS) across critical infrastructure sectors. The warning comes amid an active investigation into a cybersecurity incident…
Kia Vulnerability Enables Remote Access to Millions of Cars Using Just a License Plate
Cybersecurity researchers identified critical vulnerabilities in Kia vehicles, revealing that attackers could remotely control cars using only a license plate number. The vulnerabilities were first identified in June this year and have since been patched, but the potential impact has…
Mozilla Faces Legal Complaint Over Firefox’s New “Privacy Preserving” Tracking Feature
Non-profit privacy watchdog noyb (None of Your Business) has filed a formal complaint against Mozilla, accusing the tech company of enabling a controversial tracking feature in its Firefox browser without user consent. The feature, dubbed “Privacy Preserving Attribution” (PPA), was…
The AI-Cybersecurity Paradox: How AI is Revolutionizing Defenses While Empowering Hackers
In the rapidly evolving digital security landscape, artificial intelligence (AI) has emerged as both a powerful ally and a formidable adversary. As we navigate through 2024, the cybersecurity industry finds itself at a critical juncture, grappling with what experts call…
Dell’s Security Woes Deepen: Attackers Strike Twice in One Week
Hackers have allegedly carried out a second Dell data breach within a week, compromising sensitive internal files via Atlassian tools. Allegedly, data from Jira, Jenkins, and Confluence has been exposed. Dell is currently investigating the initial breach. On 19 September…
CISA Releases Guide to Empower Software Buyers in Creating a Secure Tech Ecosystem
Recognizing that cyber criminals increasingly exploit software vulnerabilities, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken the lead with a new resource for software customers—the “Secure by Demand Guide.” The Guide is part of CISA’s ongoing effort to…
PECB Conference 2024: A Global Forum for IT, Security, and Privacy Professionals
The PECB Conference 2024 is set to take place from 30 September to 3 October at the Van der Valk Hotel Breukelen in Amsterdam. This annual event will gather global experts, thought leaders, and professionals to explore the latest trends…
Cybersecurity in E-Commerce
In any organization, regardless of the industry or the size, cybersecurity is one of the most pressing concerns to handle. Some companies, especially those that store and manage large amounts of sensitive data and those that operate primarily in the…
Underfunding and Leadership Gaps Weaken Cybersecurity Defenses
Despite cyber risk growing at an alarming rate, a recent global study from Trend Micro, highlights that many organizations are failing to implement adequate cybersecurity measures due to a lack of strategic leadership and investment. Key Findings of the Report…
Necro Trojan Strikes Google Play Again, Infecting Popular Apps
In a troubling development, the Necro Trojan has resurfaced on Google Play, infecting popular applications and reaching millions of Android devices worldwide. Kaspersky’s cybersecurity researchers discovered the Necro malware in various apps, including some available on official app stores like…
Generative AI Fuels New Wave of Cyberattacks, HP Warns
Attackers are employing AI-generated scripts, leveraging malvertising to distribute rogue PDF tools, and embedding malware in image files. These developments mark a significant shift in the threat landscape, accelerating the frequency and complexity of cyberattacks. This was revealed by HP’s…
UN Report on Governing AI for Humanity – Key Recommendations and Insights
The United Nations (UN) Secretary-General’s High-level Advisory Body on Artificial Intelligence (HLAB-AI) released a comprehensive report titled “Governing AI for Humanity,” which proposes global governance mechanisms for Artificial Intelligence (AI). The report is based on extensive consultations and presents a…
Red Canary’s Midyear Threat Report Highlights Infostealer Surge Targeting macOS Devices
Red Canary has released a midyear update to its 2024 Threat Detection Report, revealing key cybersecurity trends and evolving threats. Among the most notable findings is the rise of Atomic Stealer, an infostealer targeting macOS devices, which entered the top…
Privacy and API security: What’s at stake?
APIs (Application Programming Interface) have assumed an indispensable role in the digital space, facilitating seamless communication and data exchange between an array of software applications and services. They underpin our daily interactions, from ordering meals through food delivery apps to…
Analysis of ENISA’s 2024 Threat Landscape Report: Key Takeaways and Implications
The European Union Agency for Cybersecurity (ENISA) has released its annual Threat Landscape report for 2024, providing crucial insights into the evolving cybersecurity challenges facing the EU. Here are the key takeaways: Prime Threats Remain Consistent Denial of Service (DDoS)…
FTC Sounds the Alarm on Social Media Spying on Children and Teenagers
Social media and video streaming services (SMVSSs), including Amazon, Alphabet-owned YouTube, Meta’s Facebook and TikTok, are engaging in a “vast surveillance of users” to profit off their personal information. The report also raised concerns about the lack of meaningful privacy…
7 Steps to Perform a Cyber Attack Simulation
We can learn a lot from soccer and American football teams when it comes to attack and defense strategies. Players analyze the opposing team’s strategy to identify weak spots, adapt their offensive orchestration accordingly, and, most importantly, practice, practice, practice.…
U.S. Justice Department Disrupts China-Backed Botnet Targeting Thousands of Devices
In a major cyber operation, the U.S. Justice Department announced the successful takedown of a botnet controlled by People’s Republic of China (PRC) state-sponsored hackers. The botnet, dubbed “Raptor Train” by Black Lotus Labs, spanned over 200,000 devices globally. It…
Emerging Technologies in Cloud Security for Enhanced Protection Against Cyber Threats
Some industry experts highlight the unique cybersecurity needs of cloud-based operations, noting that protecting sensitive data differs from traditional on-premises networks. While emerging technologies haven’t changed the ongoing battle between cybersecurity professionals and criminals, they have raised the stakes, making…
More Hezbollah Devices Explode in Lebanon, Heightening Fears of Regional Conflict
Tensions in Lebanon soared on Wednesday as handheld radios used by Hezbollah fighters exploded across the country’s south, marking the deadliest day since cross-border skirmishes with Israel began nearly a year ago, reported Reuters. The explosions left 20 dead and…
Hezbollah Pager Attack: A Wake-up Call to Tech Manufacturers to Secure their Supply Chains?
In a coordinated and deadly attack, pagers used by hundreds of Hezbollah members exploded almost simultaneously across Lebanon on Tuesday, killing at least nine people and injuring thousands more, according to officials. Both Hezbollah and the Lebanese government have pointed…
Cyware Joins Coalition for Secure AI (CoSAI) to Advance Safe and Ethical AI Technologies
Cyware joins CoSAI to help drive the development of secure and ethical AI technologies, addressing the urgent need for AI safety amid today’s rapidly evolving cyber threats. Cyware, a provider of threat intelligence management, security collaboration, and orchestrated response, has…
Deadly Pager Explosions in Lebanon Linked to Possible Supply Chain Attack
Yesterday, Reuters reported that multiple explosions involving communication devices used by Hezbollah resulted in at least nine deaths and over 3000 injuries across Lebanon. Among those wounded were Hezbollah fighters, medics, and Iran’s ambassador to Lebanon, Mojtaba Amani, who sustained…
Phishing Campaigns Surge with New Header Refresh Technique, Targeting Financial and Government Sectors
In 2024, Unit 42 researchers observed a sharp increase in large-scale phishing campaigns using a novel technique involving the HTTP response header. Between May and July, they detected approximately 2,000 malicious URLs daily, which directed web browsers to refresh or…
TfL Employees Face In-Person Identity Verification Following Cyberattack
Nearly two weeks after a significant cybersecurity breach, Transport for London (TfL) announced on its employee hub that its 30,000 employees must attend in-person appointments to verify their identities and reset their passwords. This move follows a full system reset…
The Human Element in Non-Human Identity Security: Bridging the Gap in Modern Cybersecurity
In today’s cybersecurity landscape, Non-Human identities (NHIs) are exploding in number. For every human user, there may be hundreds or even thousands of NHIs running in the background. Traditional access management tools were designed primarily for human users, and they…
Hunters International Claims Breach of ICBC London
The ransomware group, Hunters International, has reportedly claimed responsibility for a breach at the London branch of the Industrial and Commercial Bank of China (ICBC), one of China’s largest state-owned banks. According to the group, they have exfiltrated 6.6 terabytes…
Researchers Discover New Variant of TrickMo Banking Trojan
Cleafy’s Threat Intelligence team has uncovered a new variant of the TrickMo Android banking Trojan. Initially classified as an unknown malware sample, deeper analysis revealed it as a TrickMo variant with some new anti-analysis features, making detection more difficult and…
New Environmental Policies and Practices Raise Unexpected Cybersecurity Challenges
Sound environmental policies are critical to protect the planet’s future. In response, companies have developed technologies and practices to help their respective industries and clients. While green innovation is necessary, the devices and systems have caused unexpected cybersecurity challenges. What…
Is Your Business Ready for the Quantum Cybersecurity Threat?
Imagine a world where even the strongest cybersecurity defenses crumble in seconds. This isn’t a sci-fi plot; it’s a looming reality with the rise of quantum computing—a technology that could revolutionize industries and dismantle current encryption methods. Quantum computing is…
Android TV Box Malware, Vo1d, Infects Over a Million Devices Worldwide
Cybersecurity experts at Doctor Web have uncovered a massive malware campaign targeting Android-based TV boxes. Dubbed Android.Vo1d, the newly discovered malware has infected nearly 1.3 million devices across 197 countries, making it one of the most widespread infections of its…
Fortinet Confirms Data Breach
Cybersecurity firm Fortinet has confirmed that user data was stolen from its Microsoft SharePoint server and posted on a hacking forum earlier today, according to a report by BleepingComputer. The threat actor, known as “Fortibitch,” shared credentials to what is…
How Can Individuals Protect Themselves from Ransomware Attacks?
Ten years ago, ransomware actors mainly worked alone or in small groups, targeting home computer users through spam emails to encrypt personal files and demand relatively small amounts of cryptocurrency for their safe return. Today, many ransomware gangs operate like…
Lazarus Group Targets Developers with Fake Coding Tests
A fresh wave of attacks tied to North Korea’s infamous Lazarus Group is targeting software developers through fraudulent job recruitment schemes. These attacks are part of the VMConnect campaign, first uncovered in August last year. Malicious actors pretend to be…
DragonRank SEO Manipulator is Targeting Asia and Europe
A new cyber threat dubbed “DragonRank” is actively targeting countries across Asia and Europe. Discovered by Cisco Talos, the sophisticated campaign leverages malicious tools like PlugX and BadIIS to exploit web application services and manipulate SEO rankings. DragonRank primarily focuses…
Behind the Power of the Cloud
It takes up to 7,500 liters of water to manufacture a single pair of jeans. All the work required to soften denim to a texture that consumers will buy, as well as the addition of sandblasting to distress them to…
Unveiling Hidden APIs and Securing Vulnerabilities in the Healthcare Sector
Healthcare is no longer just about treating the sick; it’s about safeguarding their most personal information. Unfortunately, today, a slew of threats target this sector, including ransomware, phishing, API vulnerabilities, and the significant complexities of securing interconnected systems and supply…
RansomHub Serves Up LaZagne
New Attack Technique Using TDSSKiller and LaZagne Disables EDR The RansomHub ransomware group has debuted a novel attack strategy, using a combination of tools to disable endpoint detection and response (EDR) systems and steal credentials. This is a change in…
The Biggest Cyber Warfare Attacks in Global Geopolitics
As governments, businesses, and organizations increasingly rely on digital systems, cyberattacks have become more systematic and widespread. These coordinated attacks can disrupt a country’s operations just as much as a physical offensive, making it crucial to understand their possible impact.…
Strengthening Healthcare Cybersecurity: Lessons from Recent Supplier Attacks
The global healthcare system has become increasingly integrated with third-party medical suppliers in recent years. These suppliers are vital in providing essential services, medical equipment, pharmaceuticals, and digital tools that healthcare organizations depend on to operate efficiently. However, while these…
Payment Gateway Breach Exposes 1.7 Million Customers
A significant data breach at the payment gateway provider SLIM CD has exposed over 1.7 million customers to the risk of identity theft and financial fraud. The breach, which took place between August 2023 and June 2024, compromised sensitive personal…
The Role of SIEM in Regulatory Compliance
Organizations of every size and in every industry must adhere to stringent compliance standards. Regulations like the Health Insurance Portability and Accountability Act (HIPAA), the General Data Protection Regulation (GDPR), and the Payment Card Industry Data Security Standard (PCI DSS)…
Advanced surveillance is key to countering emerging global threats
Almost 80 years ago, George Orwell coined the phrase “Big Brother is watching you” in his dystopian thriller, 1984. Even he couldn’t image the advances and capabilities in surveillance that are prevalent today. Geopolitical unrest and extremist ideology are a…
Predator Spyware Resurfaces: Renewed Threats and Global Implications
Intellexa’s Predator spyware is back. After facing sanctions and exposure by the US government, the scourge appeared to decline. However, recent findings from Insikt Group, the threat research arm of cyber security company Recorded Future, reveal that Predator’s infrastructure is…
Prevalent, Indigocube Security Partner to Elevate Third-Party Risk Management Solutions in SA
Prevalent, a third-party risk management solutions provider, has partnered with Indigocube Security, a cybersecurity consultancy in SA. This collaboration aims to enhance the way organizations in SA manage and mitigate third-party risks, offering comprehensive solutions that enhance security, resilience, and…
Tropic Trooper Expands Targeting: Middle East Government Entity Hit in Strategic Cyber Attack
Kaspersky has discovered that an advanced persistent threat (APT) group, Tropic Trooper, also known as KeyBoy and Pirate Panda, has been linked to a series of targeted attacks on a government entity in the Middle East. This is a strategic…
Bitdefender Debuts Security Solution for YouTube Content Creators and Influencers
Bitdefender has unveiled Bitdefender Security for Creators, a service specifically designed for digital content producers, online creative professionals, and social media influencers who are prime targets for account takeovers, fraud, and other cybercrimes. Initially the new offering protects YouTube accounts with…
A Deep Dive into IoT Communication Protocols
The Internet of Things (IoT) has revolutionized the way devices interact and share information. IoT communication protocols are at the heart of this technological advancement – the rules and standards that enable diverse devices to communicate effectively. This article explores…
New PyPI Supply Chain Attack Technique Puts 22,000 Packages at Risk
A newly discovered PyPI hijack technique called “Revival Hijack” has been exploited in the wild, posing a significant threat to thousands of Python packages. Identified by JFrog’s security research team, the method takes advantage of a loophole in the PyPI…
Double Trouble: DOJ Exposes Russian AI-Powered Disinformation
The US Department of Justice has disrupted a covert Russian government-sponsored influence operation targeting audiences within its borders and other nations. The operation, dubbed “Doppelganger,” involved using influencers, AI-generated content, and paid social media advertisements to spread disinformation aimed at…
The Six Most Dangerous New Threats Security Teams Need to Know About
The rise of AI presents both extraordinary opportunities and intimidating challenges in cybersecurity. While AI can easily identify and exploit vulnerabilities, deploying it without robust security measures introduces significant risks. As the technology evolves, many organisations prioritise AI innovation at…
Phishing Remains Top Cyber Threat Despite Drop in Incidents
Phishing remains the most common cyber threat, representing 37% of incidents in Q3 2024. However, incidents of credential exposure have increased to almost 89%, raising concerns about data security risks across industries, according to the latest report by ReliaQuest on…
Cisco Warns of Critical Vulnerabilities in Smart Licensing Utility
Cisco has warned of multiple critical vulnerabilities in its Smart Licensing Utility, potentially enabling unauthenticated, remote attackers to collect sensitive information or gain administrative control over the software. The vulnerabilities, identified as CVE-2024-20439 and CVE-2024-20440, can be found in several…
Can Every Business Afford to Be a Target?
As malicious actors increasingly create cybercriminal business models, small and medium-sized businesses (SMBs) face a changing cyber threat landscape. Today, being a cybercriminal no longer requires advanced technical skills, expanding the number of attackers and their attack capabilities. Unlike larger…
Webinar: Unveiling Hidden APIs and Securing Vulnerabilities in the Healthcare Sector
The healthcare industry is a magnet for cybercriminals, and it’s easy to see why. First, the treasure trove of personal health information (PHI) is incredibly valuable—from detailed medical histories to sensitive financial data, this information isn’t just gold—it’s like striking…
Explaining the OWASP API Security Top 10
Any company that employs APIs can tell you that they’re the glue that holds all things together, the hub that simplifies and scales digital growth. However, not all can tell you how to protect them. And that’s a problem. Thankfully,…
SLOW#TEMPEST Campaign Targets Chinese Users with Advanced Tactics
A sophisticated cyber campaign, dubbed SLOW#TEMPEST, has been uncovered by the Securonix Threat Research team, targeting Chinese-speaking users. The attack, characterized by the deployment of Cobalt Strike payloads, managed to evade detection for over two weeks, demonstrating the malicious actors’…
The MadRadar Hack Can Cause Autonomous Cars to Malfunction and Hallucinate
Self-driving cars come closer to being a reality every day. Many vehicles already have autonomous features, but several challenges remain. Cybersecurity shortcomings are among the most concerning, and a recent experiment dubbed “MadRadar” heightens these worries. How Does the MadRadar…
North Korean Threat Actor Exploits Chrome Zero-Day
A North Korean threat actor has been found exploiting a zero-day vulnerability in Chromium, now designated as CVE-2024-7971. The exploit, which enables remote code execution (RCE), is being attributed with high confidence to a North Korean group known as Citrine…
SQL Injection Vulnerability Could Enable Attackers to Bypass Airport Security
Cybersecurity researchers discovered a vulnerability in the Known Crewmember (KCM) system, a TSA program that allows airline pilots and flight attendants to bypass security screening. The flaw, which could potentially compromise the safety of millions of air travelers, was found…
Malware Masquerading as Palo Alto GlobalProtect Tool Targets Middle East Users
Users in the Middle East are being targeted by sophisticated threat actors deploying malware disguised as the Palo Alto GlobalProtect tool, Trend Micro has revealed. The malware employs a two-stage infection process, leveraging advanced command-and-control (C&C) infrastructure to evade detection…
FBI: RansomHub Hits Over 200 Entities Since Feb
RansomHub, previously known as Cyclops and Knight, has quickly gained traction, targeting over 210 victims across US critical infrastructure sectors. This ransomware-as-a-service (RaaS) model has been active since February 2024. These include water and wastewater, information technology, government services and…
Top Cost-Effective Cybersecurity Strategies for SMBs
Safeguarding your small or medium-sized business against escalating cyber threats is essential, yet the steep costs of sophisticated security measures can be daunting. This guide delves into smart, budget-friendly cybersecurity tactics designed to fortify your business without draining your finances.…
Meeting the New Cyber Insurance Requirements
In the event of a cyberattack, companies – especially small to mid-sized businesses – often face losses so great they risk pulling their business under. With the number of ransomware attacks, phishing schemes, and data breaches on the rise, it…