Only one-third of UK organisations have a validated plan in place to handle cyberwarfare; and 57% have stalled or stopped digital transformation projects due to the threat of cyberwarfare Armis, the leading asset visibility and security company, today announced preliminary…
Tag: Information Security Buzz
Russia’s Largest ISP Reports Highest DDoS Attacks in 2022
The year 2022 was a record-breaking year for Distributed Denial of Service (DDoS) attacks in Russia. According to a report released by Russia’s largest internet service provider (ISP), Rostelecom. The company recorded 21.5 million critical web attacks against 600 Russian businesses,…
Threat Actors Adopt Silver To Popular C2 Frameworks
What originally served as a Cobalt Strike substitute has evolved into a popular C2 platform for threat actors. All essential capabilities for adversary simulation are being offered by Sliver, an open-source, cross-platform adversary emulation/red team framework. These include staged and…
How To Safeguard Your Business From Cybersecurity Stress And Prevent IT Burnout
The number of data breaches and their effects are increasing as more aspects of our lives move online. It’s not surprising that the latest IBM Data Breach report found that the average cost of a hack to businesses has reached…
The Information Revolution – Revisiting Your DLP
Data loss prevention (DLP) has been around for well over 15 years. It’s by far the most effective tool for protecting data assets, scanning, and blocking users from sending critical files or sensitive information, such as credit card or customer…
2022 Cyber Review – Is Your Organisation Ready For 2023
Looking back at 2022 is instructive as you prepare your cybersecurity approach for 2023. Ithelps guide your security approach and helps prepare employees and systems for the yearahead. For example, some state-backed attacks focus on stealing intellectual property fromtechnology companies.…
GTA Online Glitch Exploited, Corrupts Players’ Accounts & Ban
Due to an alleged bug in the game’s PC version, Grand Theft Auto (GTA) Online gamers claim to have lost game progress, had their in-game money taken, and been blacklisted from the game servers. GTA Online is the multiplayer version…
Celebrating Data Privacy Day – 28th January 2023
As we approach Data Privacy Day on January 28th, 2023, we must take the time to reflect on the importance of protecting our personal information. With the digital age in full force, we share an enormous amount of data online,…
Riot Games Move Release Of Game Patches After Security Breach
After discovering last week that its development environment had been breached. Riot Games, the publisher, and producer of the computer games League of Legends and Valorant announced that it would postpone game patches. The LA-based game publisher revealed the incident…
FanDuel Cautions Users Of Data Breach In Vendor Hack
Customers of the FanDuel sportsbook and betting platform are being cautioned that their names and email addresses were made public due to a security breach at MailChimp in January 2023. Users are advised to be on the lookout for scam…
Chinese 8220 Gang Aims For Public Clouds And Vulnerable Apps
The 8220 Gang, a Chinese threat organization that operates for profit, was the subject of a threat bulletin from Radware today. Using a specially created crypto miner and IRC bot, the group, also known as the 8220 Mining Group has…
37 Million T-Mobile API Data On Customers Stolen in Hack
Following a network intrusion by a “unidentified malicious intruder,” around 37 million T-Mobile customers had their personal information taken. Its been confirmed that data taken were customers’ addresses, phone numbers, and dates of birth were among the data taken, the…
35k PayPal Accounts Compromised In Credential Stuffing Attack
35k accounts of PayPal users were affected by a large-scale credential stuffing attack that exposed their personal information. The attack, which took place between December 6th and December 8th, 2022, was quickly detected and mitigated by the company. However, PayPal also…
Ransomware Trends In Q4 2022: Key Findings and Recommendations
Ransomware attacks continue to pose a significant threat to organizations and industries worldwide. The Q4 2022 ransomware report by ReliaQuest (formerly Digital Shadows) comprehensively analyzes the latest trends and developments in the ransomware landscape. The report is based on primary…
Mailchimp Reports Data Breach, Employees Records Exposed
Hackers gained access to an internal customer assistance and account administration tool, and the email marketing company MailChimp had another breach that gave threat actors access to the information of 133 customers. According to MailChimp, the attackers used social engineering…
FTX Says $415 Million Of Its Crypto Assets Was Hacked
FTX, a bankrupt cryptocurrency exchange, said on Tuesday to creditors that cyberattacks had stolen around $415 million in cryptocurrencies. Since FTX declared bankruptcy on November 11, its CEO John Ray has revealed in a separate statement. That $90 million in…
1,000 Ships Affected By Ransomware Attack On DNV’s Software
DNV, a Norwegian assurance and risk management firm and classification organization, has confirmed that almost 1,000 ships were affected by a recent ransomware cyberattack on its fleet management system. After the hack on its ShipManager fleet management and operations platform…
Avast Provides A Free Decryptor For BianLian Ransomware
In order to assist victims of the infection in retrieving their files without paying the thieves, security software provider Avast has made a free decryptor for the BianLian ransomware strain available. The release of a decryptor comes just over a…
Nissan Data Breach Caused By Vendor-Exposed Database
Nissan North America has started delivering data breach notifications that there has been a disclosure of client data due to a breach at a third-party service provider. On Monday, January 16, 2023, Nissan notified the security breach to the Office…
Major Canadian Liquor Distributor’s Website Infected With Skimmer
One of the largest liquor distributors in Canada, the Liquor Control Board of Ontario (LCBO), serves over 670 stores throughout Ontario. It has recently confirmed that a web skimmer had been injected into its online store, compromising customers’ personal data…
Odin Intelligence Website Used By Police Wrecked, Data Stolen
Over the past week, a group claimed to have wrecked the website of ODIN Intelligence, a business that offers technology and solutions to law enforcement and police departments. They had a severe security flaw that exposed sensitive information about upcoming…
VIPRE Security Group’s New Endpoint Detection And Response (EDR) Technology Powerfully Built For Small And Mid-sized Enterprises
[17.01.23] VIPRE Endpoint Detection & Response (EDR) delivers streamlined, sophisticated, high-performing cloud-based EDR management in a single, easy-to-navigate console. VIPRE Security Group, an industry-leader and award-winning global cybersecurity, privacy, data, and user protection company, announced today the launch of its…
Cyber Threat Landscape Study 2023: Outpost24’s Honeypot Findings From Over 42 Million Attacks
The Outpost24 research team have released the results of attack data gathered from a network of honeypots deployed to gather actionable threat intelligence. In total, 42 million attacks were registered between January 1st and September 30th 2022, with 20 honeypots evenly distributed around the…
Datadog Changes RPM Signing Key Exposed in CircleCI Hack
Datadog, a cloud security company, reports that a recent CircleCI security incident exposed one of its RPM GPG signing keys and its passphrase. The business has yet to discover proof that this key has been compromised or misused. Datadog stated…
Third-Party Risk Management: Why 2023 Could Be The Perfect Time To Overhaul Your TPRM Program
Ensuring risk caused by third parties does not occur to your organization is becoming increasingly difficult. Every business outsources some aspects of its operations, and ensuring these external entities are a strength and not a weakness isn’t always a straightforward…
6,000+ Customer Accounts Breached, NortonLifeLock Alert Users
More than 6,000 customers of NortonLifeLock have been informed that nefarious outsiders have probably accessed their accounts and may have even gotten to their password vaults. The letter informing customers of the data breach was published on the Vermont attorney…
Pro-Russia Hacktivist Group NoName057(16) Strikes Again
Global security & privacy leader Avast has uncovered that Pro-Russia hacktivist group NoName057(16) is conducting a campaign of Distributed Denial of Service (DDoS) attacks on Ukraine and NATO organisations, which began in the early days of the war in Ukraine. Targets have…
Threats of Quantum: The solution lies in quantum cryptography
The race in quantum cryptography is on and people from all walks of life whether academics, business or industrialists, are going to be affected by it. The centuries old approach of encryption still holds importance while communication channels has advanced…
Bulk Cacti Servers Exploited In Unpatched Vulnerabilities
The bulk of Cacti servers that are accessible via the internet has not been updated to address a severe security flaw that was just patched and is currently being actively exploited. Censys, a platform for managing attack surfaces, reports that…
$5.4 Million Slammed On TikTok By France For Cookies Privacy
Prestigious social media platform and the latest internet giant TikTok have received a warning for breaking cookie consent requirements. According to France’s data protection regulators, TikTok UK and TikTok Ireland have been fined over €5.4 million by France’s data protection…
UN Hearing on Proposed Cybercrime Treaty: Legal Measures to Tackle Cybercrimes
The United Nations is holding its first ever global cybercrime treaty this week. The 4th round of this hearing is scheduled this January from 9 – 20 January. The focus of the hearing is “state response to cybercrime ” and…
Fortinet: Hackers Exploit Zero-Day Vulnerability in VPN
Unknown attackers used a FortiOS SSL-VPN zero-day vulnerability patched last month in attacks on government organizations and government-related targets, according to Fortinet. The exploited security issue (CVE-2022-42475) is a heap-based buffer overflow vulnerability found in the FortiOS SSLVPNd that allows…
MetaMask Alerts Crypto Users About Address Poisoning Scam
MetaMask, a cryptocurrency wallet provider, is alerting customers about a new fraud known as ‘Address Poisoning,’ which involves tricking users into sending payments to a scammer rather than the intended receiver. When MetaMask users send or receive cryptocurrency, the transaction…
Royal Mail Struck By ‘Cyber-Incident’ Leading To Post Delay
It has been reported that the Royal Mail, a primary postal service in the United Kingdom, has been hit by a cyber-incident. The company has advised customers to stop sending items overseas while it works to resolve the issue. In…
NOTAM Systems Offline, All U.S. Flights Disrupted By FAA
In an unexpected turn of events, the Federal Aviation Administration (FAA) suspended all outgoing aircraft in the United States this morning. The cause of the grounding is currently unknown, with flights now resuming but with no clear explanation as to…
Royal Mail Stroke By ‘Cyber-Incident’ Leading To Post Delay
It has been reported that the Royal Mail, a primary postal service in the United Kingdom, has been hit by a cyber-incident. The company has advised customers to stop sending items overseas while it works to resolve the issue. In…
Worldwide Ransomware Attacks Trend
According to Comparitech’s worldwide ransomware tracker, 2022 saw a huge dip in the number of publicly-reported ransomware attacks. In 2022, 769 attacks were collated by the researchers, compared to 1,365 in 2021. But that’s not to say hackers have been any…
San Francisco Transit Police Confidential Files Leaked By Hackers
The recent cyber-attack on the San Francisco Transit Police Department (SFTP) has highlighted the critical need for robust cyber security measures in the public sector. The attack, which took place over the weekend, targeted the department’s computer systems. This resulted…
Kinsing Malware Hits Kubernetes Clusters By Flawed PostgreSQL
As of late, Kubernetes clusters have been actively breached by the Kinsing malware, which exploits vulnerabilities in container images and misconfigured, exposed PostgreSQL containers. While not new, the Defender for Cloud team at Microsoft has noticed a spike in recent…
Denmark Central Bank Hit By DDoS Attack and Other Private Banks
In yet another DDoS attack on financial institutions, according to the Denmark central bank and an IT business that works with the financial sector. Hackers have disabled access to the websites of seven private banks in Denmark this week. Reports…
Data Loss Prevention Capability Guide
Data Loss Prevention, or DLP, is a vital component of any business’s cybersecurity strategy. It is a set of technologies and processes that help prevent the unauthorized access, use, or transfer of sensitive or confidential data. This includes data stored…
Steps to Planning and Implementation of Data Loss Prevention
Data loss prevention (DLP) is a security strategy that aims to prevent unauthorized access, disclosure, modification, or destruction of sensitive data. Protecting sensitive data is crucial for maintaining data confidentiality, integrity, and availability and for upholding the trust of customers,…
Darknet Drug Markets Switches To Custom Android Apps
Custom Android apps are now being used by online drug and other illegal substance markets on the darknet to boost privacy and elude law enforcement. These apps enable customers of pharmacy stores to contact suppliers and give particular delivery instructions…
22,000 Projects In JsonWeb Token Library Glitched By RCE
The well-known JsonWebToken (JWT) open-source encryption project has a high-severity vulnerability (CVE-2022-23529) that attackers might exploit to get remote code execution (RCE) on a target encryption server. The JWT open standard outlines a process for securely sending data by encrypting…
Practical Risk Management – Beyond Certification
Organisations regularly invest in their information security management systems (ISMS). These investments are a cost-of-business and cover the basics of fulfilling regulatory, compliance and certification requirements. However, most organisations implement ISMS based on the ISO framework, creating policies and documentation…
Text-to-SQL Vulnerabilities Allow Data Theft and DoS Attacks
Text-to-SQL models are a type of artificial intelligence (AI) used in database applications to facilitate communication between humans and database systems. These models use natural language processing (NLP) techniques to translate human questions into SQL queries, allowing users to interact…
Malware: Pokémon NFT Games Tricks Users To Download Into PCs
A skillfully designed website for the Pokemon NFT card game is being used by threat actors to disseminate the NetSupport remote access tool and commandeer victims’ devices. The “pokemon-go[.]io” website, which is still active as of this writing, advertises a…
6 PyPI Packages Detour Firewall Using Cloudflare Tunnels
Six dangerous packages were discovered on PyPI, the Python Package Index, that used Cloudflare Tunnel to get over firewall constraints for remote access while also installing data-stealing and RAT (remote access trojan) malware. The malicious packages try to run shell…
Visual Studio Code Prone To Abuse By Malicious Extensions
With the intention of building supply chain attacks, malicious extensions could be uploaded using a new attack vector that targets the Visual Studio Code extensions marketplace. According to Ilay Goldman, a security researcher at Aqua, the method “may operate as…
Technical and Legal Risks of ChatGPT: How prepared are we with Laws on AI?
“Generative AI refers to artificial intelligence systems that are capable of generating new content, such as text, images, or audio….One potential risk is related to intellectual property. Generative AI systems may be able to create original works that are difficult…
14 UK Schools Confidential Documents Leaked By Hackers
Private information about young students was posted online as a result of a cyberattack that targeted schools across the nation. A major cyber-attack that affected 14 UK schools led to the disclosure of private student records. Hackers exposed staff contracts…
Wabtec Announces Global Data Breach In LockBit Attack
The Wabtec Corporation has finally provided information regarding a data security breach that occurred last year and resulted in the compromise of extremely sensitive personal data. The $8 billion company was the victim of a ransomware attack that was first…
Employee Tokens Stolen Through Slack GitHub Account
Users of one of the leading business communication and collaboration platforms, Slack, have been warned that hackers have stolen several of its private source code repositories. At the same time, Slack insists the damage is minimal. Slack revealed the incident…
15+ Car Manufacturers’ Exploitable in API Vulnerabilities
In a recent report, web application security researcher Sam Curry revealed serious vulnerabilities in the API (application programming interfaces) endpoints of cars from 15+ major manufacturers. These vulnerabilities allow hackers to remotely access vehicle telematics systems, activate horns and lights,…
235 Million Twitter Users Leaked In Biggest Data Leak
A well-known hacker site allegedly dumped a database containing the email addresses of over 235 million Twitter users and is being sold for roughly $200,000. According to a cyber intelligence company, this data leak has the potential to rank among…
Five Guys Breached: Burger Franchise Suffers Data Compromise
Five Guys Enterprises LLC, a chain of burger restaurants, has reported a data breach that led to the loss of personally identifiable information from job applications. The information was provided in a form letter dated December 29 that was submitted…
Is NHS The Most Impersonated UK Government “Brand”?
The National Health Service (NHS) is the most impersonated UK government organization in scams, according to a recent report. This is concerning news, as scams targeting the NHS can have serious consequences for individuals and the NHS as a whole.…
ChatGPT: An Easy Cybercrime Target For Cyberattacks
As artificial intelligence (AI) becomes more prevalent in our daily lives, it’s essential to consider new technologies’ potential risks and benefits. One such example is ChatGPT, a popular new AI chatbot that has gained significant popularity in a short period…
Chinese Students In UK Targeted By Redzei Chinese Scammers
For over a year, Chinese overseas students in the United Kingdom have been targeted by persistent Chinese-speaking scammers as part of an operation known as RedZei (aka RedThief). “The RedZei scammers meticulously select their targets, analyze them, and know it…
Steps To Planning And Implementing Identity And Access Governance
Identity and access governance is a crucial aspect of any organization’s security strategy. It involves the management of user identities and the control of access to systems and resources. Proper identity and access governance can help prevent unauthorized access, protect…
22 Ways To Protect WordPress Website From Cyber Attacks
As a website owner, it is essential to prioritize the security of your WordPress website. Cyberattacks and hacking attempts can compromise sensitive information, disrupt your website’s functionality, and damage your online reputation. To protect your website and your business, it…
22 Ways To Protect Your Website From Cyber Attacks
As a website owner, it is essential to prioritize the security of your WordPress website. Cyberattacks and hacking attempts can compromise sensitive information, disrupt your website’s functionality, and damage your online reputation. To protect your website and your business, it…
PCB’s YouTube Channel Hacked, Renamed To ‘Tesla US 24’
LAHORE, Pakistan – The official YouTube channel of the Pakistan Cricket Board (PCB) was hacked on Tuesday, causing great panic among the board’s officials and its 4.4 million subscribers. The hackers not only changed the channel’s logo but also renamed…
PCB’s YouTube Channel Hacked, Renamed to ‘Tesla US 24’
LAHORE, Pakistan – The official YouTube channel of the Pakistan Cricket Board (PCB) was hacked on Tuesday, causing great panic among the board’s officials and its 4.4 million subscribers. The hackers not only changed the channel’s logo but also renamed…
Data Breach Involves 13 Million Users Of Maybank, Astro, and EC
Fahmi Fadzil, Malaysian Communications and Digital Minister, has launched an investigation into an alleged significant data breach impacting over 13 million individuals. Fadzil directed the national cyber security to investigate and take legal action if there is a data leak…
Linux Malware Exploits 30+ Plugins Into WordPress Sites
A new strain of Linux malware is targeting WordPress sites and exploiting vulnerabilities in over two dozen plugins and themes to compromise systems. Russian security firm Doctor Web discovered the malware, which has been tracked as Linux.BackDoor.WordPressExploit.1. It targets both…
Google Pays $29.5 Million To DC, Indiana ln Tracking Lawsuit
The states of Indiana and the District of Columbia in the U.S. have settled claims against Google for its location monitoring tactics, with Google agreeing to pay a total of $29.5 million to resolve the cases. The District of Columbia…
Identity And Access Governance Capability Guide
Identity and access governance (IAG) is a critical component of modern organizations, as it helps manage users’ identities and access various resources and systems. IAG encompasses a range of processes and technologies that help to ensure that only authorized users…
Insights To Identity And Access Governance
Identity and access governance (IAG) is a critical component of modern organizations, as it helps manage users’ identities and access various resources and systems. IAG encompasses a range of processes and technologies that help to ensure that only authorized users…