The importance of cybersecurity has never been higher than it is in the current digital era. The threat of online thieves and cyberattacks increases as technology develops and penetrates more aspects of our daily lives. The need for cybersecurity experts…
Tag: Information Security Buzz
Dish Network Offline Following Cyberattack, Staff Disconnected
The websites and apps of Dish Network, a leading American TV company and satellite broadcaster, have unexpectedly stopped working for the past 24 hours. According to customers, the company’s call center phone numbers appear to be unavailable. A number of…
New S1deload Malware Hijacking Youtube And Facebook Accounts
A new malware campaign called S1deload Stealer has been discovered by Bitdefender’s Advanced Threat Control (ATC) team, targeting YouTube and Facebook users. The malware infects computers, hijacks social media accounts, and uses devices to mine cryptocurrency. Security researchers discovered that…
Dutch Police Arrest Three Ransomware Actors Demanding €2.5 Million
Dutch police detained three individuals on suspicion of hacking into businesses’ computer systems, extorting their management, issuing threats, and dealing in stolen data. The criminals allegedly damaged property worth millions of euros. Tens of millions of people’s private information was…
Fruit Giant Dole Suffers Ransomware Attack Affecting Activities
One of the world’s biggest growers and distributors of fresh food, Dole Food Company, has disclosed that a ransomware attack has affected its business. There is now little information available, and the business is looking into “the scope of the…
E.U. Bans TikTok From Commission Devices Over Cybersecurity
E.U. bans TikTok; the executive body of the European Union announced on Thursday that TikTok had been temporarily removed from employee phones as a cybersecurity precaution. Reflecting growing concerns from Western officials about the Chinese-owned video-sharing app. The use of…
Google Paid Security Researchers Bug Bounties Of $12 Million
With the Vulnerability Reward Program, Google last year awarded its highest bug bounty ever for an important exploit chain disclosure that the business valued at $605,000. For a total of more than 2,900 vulnerabilities in its products that security researchers…
MyloBot Botnet Spreads Globally, 50,000+ Devices Infected Daily
Most of the thousands of systems that MyloBot has seized control of are in Iran, India, the US, Indonesia, and Indonesia. A high of 250,000 unique hosts was reached in 2020. However, new research from BitSight claims that “more than…
Hydrochasma Going After The Medical And Shipping Industries
Hydrochasma, a threat actor that no one knew about before, has been going after shipping and medical labs that work on COVID-19 vaccine development and treatments. The hackers’ goal seems to be to steal intelligence, and threat hunters at Symantec,…
How To Pursue Database Encryption
Cybersecurity remains a continual battle, with data breaches occurring at PayPal and T-Mobile in the first month of 2023 alone. To combat this challenge, businesses can strengthen their security posture by looking to reinforce their data encryption measures. In most…
Delicate US Military Emails Spill Online Via Exposed Servers
On Monday, the U.S. Department of Defense shut down a server that had been leaking private emails from the American military to the public internet for the previous two weeks. The exposed server was housed on a Department of Defense…
Trellix Finds LockBit Ransomware Gang Most Apt To Leak Stolen Data
This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Information Security Buzz Read the original article: Trellix Finds LockBit Ransomware Gang Most Apt To Leak Stolen…
Putin Speech Broadcast Temporarily Stopped By DDoS Attack
Several websites that were broadcasting President Putin’s speech in the state of the nation address on Tuesday were reportedly taken down by a suspected distributed denial of service (DDoS) attack. During the address, the All-Russia State Television and Radio Broadcasting…
Activision Admits Data Breach Exposing Employee And Game Info
Activision has confirmed that it had a data breach at the beginning of December 2022. Hackers got into the company’s internal systems by sending an SMS phishing text to a worker and getting them to click on a link. The…
Coinbase Employees The Subject Of SMS Phishing Attack
A phone call from a con artist was made to one of the employees who had fallen for the fraud after the SMS phishing attempt (also known as “smishing”). The largest bitcoin exchange on the planet, Coinbase, has disclosed a…
Samsung Upgrades Galaxy Devices To Zero-Click Attack Defense
To protect Galaxy smartphone users from so-called “zero-click” exploits that use malicious picture files, Samsung has created a new security solution called Samsung Message Guard. According to the Korean tech giant, its new security system will be able to identify…
RailYatri: 31 Million Users Affected On Indian Ticketing Platform
Although the RailYatri attack occurred in December 2022, the stolen data was only recently made public on a well-known hacker forum. In addition to exposing personal information, the RailYatri hack revealed the locations of millions of travelers throughout India. A…
Norway Seizes Crypto Worth $5.84 Million Stolen By Hackers
The Lazarus Group stole cryptocurrencies worth 60 million NOK (about $5.84 million) in March 2022 as a result of the Axie Infinity Ronin Bridge hack, according to a statement from the Norwegian police agency Økokrim. The agency stated in a…
Norway Seizes Crypto Worth $5.84 Millions Stolen By Hackers
The Lazarus Group stole cryptocurrencies worth 60 million NOK (about $5.84 million) in March 2022 as a result of the Axie Infinity Ronin Bridge hack, according to a statement from the Norwegian police agency Økokrim. The agency stated in a…
Twitter Limits SMS-Based 2FA To Blue Users Only
Twitter has stated that it will no longer enable SMS two-factor authentication unless you have a Twitter Blue subscription. However, there are multi-factor authentication alternatives that are more secure, which we outline below. Twitter said this week that non-Twitter Blue…
GoDaddy: Hackers Grabbed Source Code And Inserts Malware
GoDaddy, a major provider of web hosting services, claims that a multi-year attack on its cPanel shared hosting environment resulted in a breach where unidentified attackers took source code and put malware on its servers. Even though the attackers had…
RedEyes Hackers Adopts New Malware, Steals Data From Devices
The APT37 threat group targets people for intelligence gathering using the new elusive “M2RAT” malware and steganography. North Korea’s APT37, sometimes referred to as “RedEyes” or “ScarCruft,” is a hacker collective thought to be funded by the government. The hacker…
FBI Investigating Cybersecurity Incident On Its Network
According to reports, the FBI is looking into harmful online behavior on the network of the agency. The federal law enforcement organization claims to have already stopped the “isolated occurrence” and is investigating its full extent and overall effects. The…
Atlassian Data Breach, Company Info Stolen From Third-Party App
Atlassian has confirmed that its network and client data are secure and that a recent data leak at a third-party vendor was the result of a compromise. Cyberscoop was the first to reveal that a hacker organization by the name…
Google Ads Spreads FatalRAT Malware, Disguised As Popular Apps
According to a new study, the FatalRAT malware, which spreads via bogus websites for well-known apps, targets Chinese-speaking people. FatalRat malware, which was first identified in August 2021, has the ability to record keystrokes, alter the screen resolution of a…
$100 Million In Stolen Crypto Disguised in Lazarus New Mixer
Blockchain analysts have uncovered evidence that North Korean hackers have found a way to get around U.S. sanctions to launder the bitcoin gains from their heists. Through a single crypto-mixing business named Sinbad, The Lazarus Group, as the threat actor…
Cloudflare Stops Over 71 Million RPS Record-Breaking DDoS Attack
Cloudflare thwarted the largest volumetric distributed denial-of-service (DDoS) attempt ever this past weekend. The company reported that it had stopped dozens of hyper-volumetric DDoS attempts over the weekend that had been directed at its clients. The most extraordinary attack exceeded…
Scandinavian Airlines Hit By Hackers, Anonymous Sudan Takes Credit
A cyberattack against Scandinavian Airlines was reported, and “Anonymous Sudan” took credit. On Tuesday, a hack against Scandinavian Airlines (SAS) caused its website to go down and revealed some customer information. Customers who sought to log onto the SAS mobile…
Upsurge In ESXiArgs Ransomware Attacks, New Targets In Europe
ESXiArgs ransomware assaults have recently affected hundreds of different systems, but it’s still not known which vulnerability is being used. The number of ESXiArgs ransomware assaults has increased recently, but it’s still unclear exactly which vulnerability threat actors are utilizing.…
City Of Oakland Declares State Of Emergency After Ransomware Attack
Because of the effects of a ransomware assault that required the City to shut down all of its IT systems on February 8, the City of Oakland has declared a local state of emergency. G. Harold Duffey, the interim city…
Beep: New Evasive Malware That Can Escape Under The Radar
Beep 4 was discovered last week, a brand-new stealthy virus with several capabilities to avoid analysis and detection by security tools. After a flurry of samples were posted to VirusTotal, an internet portal for file scanning and harmful content identification,…
MortalKombat Ransomware Infects Computer, Steals Crypto From Users
Organizations in the Philippines, Turkey, the Philippines, and the United Kingdom have recently been affected by MortalKombat, a new ransomware that cybersecurity experts are pointing out. Using MortalKombat and a brand-new piece of malware called Laplas Clipper, researchers from Cisco’s…
RedEyes Hackers Adopts New Malware, Steals Data From Devices
The APT37 threat group targets people for intelligence gathering using the new elusive “M2RAT” malware and steganography. North Korea’s APT37, sometimes referred to as “RedEyes” or “ScarCruft,” is a hacker collective thought to be funded by the government. The hacker…
An Overview Of Essential BlueTeam Tools For Cybersecurity
Preventing data breaches and other cyberattacks is paramount in today’s digital world. Members of the BlueTeam are security experts tasked with finding and fixing vulnerabilities before they cause damage to an organization. Every cybersecurity team needs access to a variety…
$100 Million In Stolen Crypto Disguised in Lazarus New Mixer
Blockchain analysts have uncovered evidence that North Korean hackers have found a way to get around U.S. sanctions to launder the bitcoin gains from their heists. Through a single crypto-mixing business named Sinbad, The Lazarus Group, as the threat actor…
Cloudflare Stops Over 71 Million RPS Record-Breaking DDoS Attack
Cloudflare thwarted the largest volumetric distributed denial-of-service (DDoS) attempt ever this past weekend. The company reported that it had stopped dozens of hyper-volumetric DDoS attempts over the weekend that had been directed at its clients. The most extraordinary attack exceeded…
Pepsi Bottling Ventures Breached Following Malware Attack
Following a network intrusion in which information-stealing malware was installed, and data was extracted, Pepsi Bottling Ventures LLC, one of the largest bottlers of Pepsi-Cola beverages in the United States, experienced a data breach. Although the security lapse occurred on…
Chinese Tonto Team Hackers’ Failed Attempt On Group-IB Fails
In June 2022, the advanced persistent threat (APT) actor Tonto Team attempted to target the cybersecurity firm Group-IB but was unsuccessful. The business, with its headquarters in Singapore, claimed to have identified and stopped emails the group sent to trick…
Namecheap Email Hacked, Phishing Emails Sent To MetaMask & DHL
A Sunday night email hack at domain registrar Namecheap resulted in a deluge of DHL and MetaMask phishing emails that sought to steal the recipients’ personal information and bitcoin wallets. The phishing attacks began at 4:30 PM ET and came…
North Korea Using Healthcare Ransomware To Fund More Hacking
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released new cybersecurity advice that details recent tactics, methods, and procedures (TTPs) associated with North Korean ransomware attacks against public health and other critical infrastructure sectors. The report was produced jointly…
10 API Security Best Practices To Protect Your Organization
APIs continue to play an integral role in the software development industry, paving the way for better software integration and allowing for a more seamless user experience, and transfer of data, vital or otherwise, from one server to another, or…
Canadian Bookstore Indigo Shuts Down Website After Cyberattack
The largest chain of bookstores in Canada, Indigo Books & Music, was the victim of a hack yesterday, forcing the business to restrict online payments to cash and shut down its website for customers. Although the precise nature of the…
Reddit Hacked In Phishing Attack Against Its Employee
On Sunday night, the popular social platform Reddit was the victim of a cyberattack that granted hackers access to its internal business systems and provided them the chance to obtain sensitive data and source code. The company claims that the…
Hackers Bypass ChatGPT Restrictions Via Telegram Bots
Researchers revealed on Wednesday that hackers had found a means to get beyond ChatGPT’s limitations and are using it to market services that let users produce malware and phishing emails. ChatGPT is a chatbot that imitates human output by using…
Russian Hackers Steal Data In Ukraine With New Graphiron Malware
There is evidence that hackers with ties to Russia are using new software designed to steal information to launch attacks against Ukraine. This malware, discovered by the Computer Emergency Response Team of Ukraine (CERT-UA) and dubbed Graphiron by Broadcom-owned Symantec,…
Weee! Acknowledges Data Leak,1.1 million People Impacted
A data breach at the Weee! Asian and Hispanic meal delivery business exposed the private data of 1.1 million clients. Weee! bills itself as the most prominent Asian and Hispanic supermarket in North America, shipping groceries to all 48 states…
20 Powerful Vulnerability Scanning Tools In 2023
Vulnerability scanning is the process of using automated tools to identify potential security weaknesses and vulnerabilities in an organization’s infrastructure. It is an essential step in maintaining the security of a system as it helps identify any potential points of…
Steps To Planning And Implementation Of Data Privacy
The digital age is engulfed with the issue of data privacy. With more personal data exchanged online, organizations need to have a plan in place to protect sensitive data. In this article, we’ll outline the steps that organizations can take…
Exploit in Dota 2 Video Game Modes Infecting Players
Security specialists have discovered four malicious Dota 2 game modes that a threat actor used to backdoor the players’ systems. Avast Threat Labs researchers discovered that the unidentified attacker built four game modes for the wildly played Dota 2 multiplayer…
Mass Ransomware Campaign Hits US & EU
According to crowdsourced data examined by CNN, a new worldwide ransomware campaign has affected at least 3,800 people, including hundreds in the US, triggering warnings from European and US cybersecurity experts. However, according to “Ransomwhere,” a network created by cybersecurity…
10 API Security Best Practices To Protect Your Organization
APIs continue to play an integral role in the software development industry, paving the way for better software integration and allowing for a more seamless user experience, and transfer of data, vital or otherwise, from one server to another, or…
Bard: Google Introduces New ChatGPT Rival
Since ChatGPT’s inception in November of last year, it has experienced phenomenal growth in popularity. This growth has finally impacted Google, as it just unveiled Bard as a ChatGPT rival and alternative. Bard is now exclusively accessible to “trusted testers,”…
New Abnormal Security Research Shows Employees Open 28% of BEC Attacks, Fail to Report 98% of All Email Attacks
Abnormal Security, the leading behavioral AI-based security platform, today released its H1 2023 Email Threat Report, which examines recent developments in the email threat environment and focuses on the growing risk employees pose to an organization’s cybersecurity. The latest Abnormal research…
CERT-UA Warns Ukrainian Authorities On Remcos Cyberattacks
The Ukrainian CERT-UA (Computer Emergency Response Team) has issued a warning about potential cyberattacks against Ukrainian governmental institutions using the authorized remote access program Remcos. The agency has identified the threat actor behind the widespread phishing campaign as UAC-0050 and…
Eurocops Shuts Down Exclu Messaging App, Dozens Arrested
After a massive wave of raids across Europe last week, Law enforcement has shut down an encrypted messaging service that has been on their radar since a raid on an old NATO bunker in 2019. 48 individuals that were users…
BlackSprut: Darknet Drug Market Advertises On Billboards In Moscow
Electronic billboards in Moscow attracted the attention of locals and Russian media over the weekend. The large signs had the words “Come to me if you’re looking for the greatest” and a picture of a woman wearing a futuristic mask.…
128GB Of Russian ISP Convex Data Leaked By Anonymous Hacker
Using illegal means, the Russian government has been spying on its citizens, according to 128 GB of information leaked by Caxxii, a hacktivist group affiliated with Anonymous. The biggest Russian internet provider Convex provided the hacktivist group Anonymous with 128…
Widespread Ransomware Attacks On Vulnerable VMware ESXi Installations
In order to propagate the ESXiArgs ransomware, attackers actively target VMware ESXi servers that have not yet gotten a patch for a two-year-old remote code execution vulnerability, according to administrators, hosting firms, with the French Computer Emergency Response Team (CERT-FR).…
Dingo Crypto Token Flagged, Charges 99% Transaction Fee
Dingo Token has been reported as a possible scam by IT security firm Check Point security researchers after discovering a feature that lets the project’s owner manipulate trading fees up to 99% of the transaction value. Check Point analysts observed…
Implementing Digital Rights Management Systems To Safeguard Against Unauthorized Access Of Protected Content
Digital Rights Management (DRM) systems are a crucial tool for protecting digital content from unauthorized access or reproduction. Whether you’re a content creator looking to protect your intellectual property or a business looking to protect revenue streams, DRM is an…
Bermuda: Major Internet And Power Outage Strikes
The internet and phone service available in Bermuda was hampered by a major power outage that began on Friday evening. The government encouraged consumers as personnel attempted to restore service around the clock; they advised customers to “unplug all critical…
Romance Fraudsters Have Stolen £65m from Brits Since 2020
Since the beginning of 2020, romance fraud has caused consumer retail banks to lose 95% more money, according to data released by TSB, as part of a campaign to bring attention to the problem. In a report released today, the…
City Of London Traders Hit By Russia-Linked Cyberattack
Following an attack on a firm that is crucial to the British financial system by a ransomware group with Russian ties, trading in the City of London has fallen into disarray. A top official in the US Treasury Department said…
HeadCrab Malware Infects 1,200 Redis servers to Mine Monero
Since September 2021, about a thousand Redis servers have been infected by new stealthy malware meant to hunt down unprotected Redis servers online and create a botnet that mines for the Monero cryptocurrency. The malware, nicknamed HeadCrab by Aqua Security experts Nitzan…
UK IT Leaders Fear ChatGPT Already Being Used In Nation State Cyberattacks, Reveals New BlackBerry Research
BlackBerry Limited (NYSE: BB; TSX: BB) today released new research revealing that the majority (76%) of UK IT leaders believe that foreign states are already using ChatGPT for malicious purposes against other nations, with almost half (48%) predicting that we are…
Hacking Group: Darkweb Developers Are In High Demand
Hacker gangs frequently run like businesses; they have staff, clients, and working hours. They often employ the same strategies as legitimate tech companies and startups to find fresh individuals with improved skill sets to compete in a rising industry. The…
Safer Internet Day: Experts Reveal 7 Tips To Avoid DeepFake Scams
The world has become increasingly digital, and with that, it has also become more vulnerable to scams and fraudulent activities. One such scam is deep fake scams. Deepfake technology has been around for a few years and has been making…
OilRig Hackers Exfiltrate Data From Govt. Agencies Using New Backdoors
In an ongoing cyber espionage campaign that uses a new backdoor to exfiltrate data, the Iranian nation-state hacker group OilRig has continued to target Middle Eastern governments. Researchers at Trend Micro, Mohamed Fahmy, Sherif Magdy, and Mahmoud Zohdy, explained that…
Data Privacy Capability Guide
Data privacy is an increasingly important concern for individuals, businesses, and governments worldwide. With the rapid expansion of digital technology and the internet, sensitive information is more vulnerable than ever to unauthorized access, theft, and misuse. As a result, organizations…
29,000 QNAP Devices Unpatched In Critical Vulnerabilities
Over twenty thousand of QNAP network-attached storage (NAS) units are awaiting a patch to fix a serious security hole that was fixed on Monday by the Taiwanese business. This SQL injection vulnerability (CVE-2022-27596) allows remote threat actors to insert malicious…
Vulnerability in F5 BIG-IP May Cause DoS and Code Execution
An authenticated attacker could use a high-severity format string vulnerability in BIG-IP to cause a denial-of-service (DoS) condition and possibly execute arbitrary code, according to a warning from F5. The security flaw, identified as CVE-2023-22374, affects iControl SOAP, an open…
US Hospitals DDoS Attack, Websites Taken Down By Russian Hackers
A cyberattack took down over a dozen US hospitals’ websites on Monday morning, which is being blamed on Russian hackers. A pro-Russian organization called Killnet claims to have taken down the websites of 14 US hospitals through distributed denial of…
Porsche Stops NFT Launch While Phishing Sites Fills The Space
Porsche stopped making a new NFT line because of weak sales and criticism from the cryptocurrency community, which gave threat actors the opportunity to fill the gap by building phishing websites that steal cryptocurrency wallet users’ digital assets. Non-fungible tokens…
Romance Fraudsters Have Stolen £65m from Brits Since 2020
Since the beginning of 2020, romance fraud has caused consumer retail banks to lose 95% more money, according to data released by TSB, as part of a campaign to bring attention to the problem. In a report released today, the…
HeadCrab Malware Infects 1,200 Redis servers to Mine Monero
Since September 2021, about a thousand Redis servers have been infected by new stealthy malware meant to hunt down unprotected Redis servers online and create a botnet that mines for the Monero cryptocurrency. The malware, nicknamed HeadCrab by Aqua Security experts Nitzan…
City Of London Traders Hit By Russia-Linked Cyberattack
Following an attack on a firm that is crucial to the British financial system by a ransomware group with Russian ties, trading in the City of London has fallen into disarray. A top official in the US Treasury Department said…
UK IT Leaders Fear ChatGPT Already Being Used In Nation State Cyberattacks, Reveals New BlackBerry Research
BlackBerry Limited (NYSE: BB; TSX: BB) today released new research revealing that the majority (76%) of UK IT leaders believe that foreign states are already using ChatGPT for malicious purposes against other nations, with almost half (48%) predicting that we are…
Hacking Group: Darkweb Developers Are In High Demand
Hacker gangs frequently run like businesses; they have staff, clients, and working hours. They often employ the same strategies as legitimate tech companies and startups to find fresh individuals with improved skill sets to compete in a rising industry. The…
Safer Internet Day: Experts Reveal 7 Tips To Avoid DeepFake Scams
The world has become increasingly digital, and with that, it has also become more vulnerable to scams and fraudulent activities. One such scam is deep fake scams. Deepfake technology has been around for a few years and has been making…
29,000 QNAP Devices Unpatched In Critical Vulnerabilities
Over twenty thousand of QNAP network-attached storage (NAS) units are awaiting a patch to fix a serious security hole that was fixed on Monday by the Taiwanese business. This SQL injection vulnerability (CVE-2022-27596) allows remote threat actors to insert malicious…
Data Privacy Capability Guide
Data privacy is an increasingly important concern for individuals, businesses, and governments worldwide. With the rapid expansion of digital technology and the internet, sensitive information is more vulnerable than ever to unauthorized access, theft, and misuse. As a result, organizations…
US Hospitals DDoS Attack, Websites Taken Down By Russian Hackers
A cyberattack took down over a dozen US hospitals’ websites on Monday morning, which is being blamed on Russian hackers. A pro-Russian organization called Killnet claims to have taken down the websites of 14 US hospitals through distributed denial of…
Porsche Stops NFT Launch While Phishing Sites Fills The Space
Porsche stopped making a new NFT line because of weak sales and criticism from the cryptocurrency community, which gave threat actors the opportunity to fill the gap by building phishing websites that steal cryptocurrency wallet users’ digital assets. Non-fungible tokens…
$27,000 Awarded By Meta As Bounty For 2FA Bypass Vulnerability
A researcher has revealed the specifics of a 2FA bypass issue affecting Instagram and Facebook. A researcher has revealed the specifics of a two-factor authentication (2FA) flaw for which Facebook parent company Meta offered him a $27,000 bug bounty. In…
CyberSecurity Tools: 21 Research Tools For Threat Intelligence
Cybersecurity is an ever-evolving field and with the increasing number of cyber-attacks and data breaches. It has become crucial for organizations and individuals to be aware of the tools available to protect their online presence. With the advancement of technology,…
Schools Are A Rising Target For Ransomware Attacks
Schools are a major target for malicious cybersecurity events and ransomware attacks. One reason is they sometimes need more resources or preparation to handle cybercriminal activity. Ransomware events negatively impact a school’s finances, parents, faculty and students. Why Are Schools…
Breaking: JD Sports Data Breach Following Cyberattack
JD Sports has issued a warning that a cyberattack that affected the company may have exposed the personal information of roughly 10 million customers, including personal contact information, such as phone and email addresses. The hack may have affected customers…
20 Million Downloads In Shady Rewards Apps Via Google Play
A new class of activity-tracking apps that have recently had significant success on Google Play, the official software store for Android, has been downloaded onto more than 20 million devices. The apps present themselves as a pedometer, fitness, and habit-building…
Netflix To Clamp Down On Password Sharing By Q1 Of 2023
Netflix wants to stop people from sharing their passwords, which will be pretty upsetting for its customer who shares passwords, especially those who don’t live with you. However, the streaming service meant business this time. The company lost 200,000 customers…
Bitwarden Password Vaults Subject Of Google Ads Phishing
Google Adwords phishing campaigns steal Bitwarden and other password managers’ vault passwords. As enterprises and consumers use unique passwords at every site, password managers must keep track of them. Unless you use KeePass, most password managers are cloud-based, allowing users…
NIST A.I. Risk Management Framework Announcement
Today, the Artificial Intelligence Risk Management Framework’s initial version was released, according to the National Institute of Standards and Technology (NIST), a leading voice in developing A.I. standards (AI RMF). The AI RMF was developed over the past 18 months…
$10M Reward By U.S. For Hive Ransomware Links To Foreign Government
The FBI announced in November that since June 2021, this ransomware operation had stolen almost $100 million from more than 1,500 businesses. For information that could assist in tying the Hive ransomware organization (or other threat actors) with the international…
Gartner: Zero Trust Will Not Mitigate Over Half of Attacks
With the increasing number of cyberattacks targeting large enterprises, many companies have turned to zero-trust security measures to protect their networks and data. However, a recent report from Gartner has raised concerns about the limitations of zero trust as a…
3.7 Million Customers Data Of Hilton Hotels Put Up For Sale
A member of the forum going by the name IntelBroker has offered a database containing the personal information of 3.7 million people participating in the Hilton Hotels Honors program. According to the actor who posed a threat, the data in…
CISA: Federal Agencies Hacked Using Certain RMM Software
A “widespread cyber effort” that employed legitimate remote monitoring and management (RMM) software to spread a phishing scam affected at least two federal departments in the United States. To steal money from victims’ bank accounts through a refund scam, cybercriminals…
820K Zacks Investment Research Clients Impacted By Data Breach
The company Zacks Investment Research (Zacks) was infiltrated by hackers last year, allowing them access to 820,000 clients’ sensitive and personal data. The 1978-founded business uses cutting-edge financial data analytics systems to assist stock buyers. A threat actor entered the…
Endpoint Protection Capability Guide
In today’s digital environment, endpoint protection is more critical than ever. With the increasing use of mobile devices, laptops, and cloud services, endpoint devices are becoming the primary target for cyber-attacks. Endpoint protection is the process of securing organizational assets…
Entire US “No Fly List” Exposed Online Via Unsecured Server
The US “No Fly” list has 1.5 million entries that have been made public. The US “No Fly List” was made publicly available online by a Swiss hacker who allegedly discovered three private documents on an insecure cloud storage server.…
Steps To Planning and Implementation Of Endpoint Protection
Endpoint protection is a critical aspect of cybersecurity that helps organizations protect their endpoints (computers, laptops, mobile devices, servers, IoT devices, etc.) from potential threats. With the increasing use of technology in businesses, endpoints have become a prime target for…
GoTo Admits Hackers Stole Customers’ Backups & Encryption Keys
Customers of GoTo (previously LogMeIn) are being alerted that threat actors took encrypted backups, including user information and an encryption key for some of that data, when they infiltrated its development environment in November 2022. GoTo offers a platform for…