In the past four years, cyberattacks have more than doubled. Cybercriminals are leveraging emerging technologies like artificial intelligence (AI) to facilitate more sophisticated attacks. Geopolitical tumult has increased cyber risk. Couple these factors with a near-ubiquitous desire for businesses to…
Category: EN
Meta and SQL Server make strange bedfellows on a couch of cyber-pain
Yanks get food poisoning far more often than Brits. Is American IT just as sickening? Opinion When two stories from opposite ends of the IT universe boil down to the same thing, sound the klaxons. At the uber-fashionable AI end…
ExCobalt Cybercrime group targets Russian organizations in multiple sectors
The cybercrime group ExCobalt targeted Russian organizations in multiple sectors with a previously unknown backdoor known as GoRed. Positive Technologies researchers reported that a cybercrime gang called ExCobalt targeted Russian organizations in multiple sectors with a previously unknown Golang-based backdoor…
Enzoic appoints Kristen Ranta Haikal Wilson as CEO
Enzoic announces Kristen Ranta Haikal Wilson as its new CEO. With an exceptional track record of over 25 years in software and technology, Wilson assumes the role from Michael Greene, who remains involved with the company in an advisory capacity…
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations
A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic organizations in Taiwan between November 2023 and April 2024. Recorded Future’s Insikt Group is tracking the activity under the name…
Sellafield Pleads Guilty to Historic Cybersecurity Offenses
UK’s most hazardous nuclear site, Sellafield, has admitted criminal charges related to IT security failings This article has been indexed from www.infosecurity-magazine.com Read the original article: Sellafield Pleads Guilty to Historic Cybersecurity Offenses
Social Media Warning Labels, Should You Store Passwords in Your Web Browser?
In this episode of the Shared Security Podcast, the team debates the Surgeon General’s recent call for social media warning labels and explores the pros and cons. Scott discusses whether passwords should be stored in web browsers, potentially sparking strong…
A week in security (June 17 – June 23)
A list of topics we covered in the week of June 17 to June 23 of 2024 This article has been indexed from Malwarebytes Read the original article: A week in security (June 17 – June 23)
Techie took out a call center – and almost their career – with a cut and paste error
Have you heard the one about the techie who forgot what was on the clipboard? Who, me? Brace yourselves, gentle readers, for it is once again Monday, and the work week has commenced. Thankfully, The Reg is here with another…
Facial Recognition Startup Clearview AI Settles Privacy Suit
Facial recognition startup Clearview AI has reached a settlement in an Illinois lawsuit alleging its massive photographic collection of faces violated the subjects’ privacy rights. The post Facial Recognition Startup Clearview AI Settles Privacy Suit appeared first on SecurityWeek. This…
Consulting Companies to Pay $11 Million Failing Cybersecurity Requirements
Two consulting companies, Guidehouse Inc. and Nan McKay and Associates, have agreed to pay $11.3 million to resolve allegations of failing to meet cybersecurity requirements. Guidehouse Inc., headquartered in McLean, Virginia, will pay $7.6 million, while Nan McKay and Associates,…
The Importance of Whitelisting Scanner IPs in Cybersecurity Assessments
In the realm of cybersecurity, ensuring the safety and integrity of a network is a multifaceted endeavor. One crucial aspect of this process is the regular assessment of potential vulnerabilities within the system. As a cybersecurity professional, our work revolves…
NHS Qilin Ransomware gang is shrugging off the blame
The Qilin ransomware group, responsible for the recent attack on NHS, resulting in the cancellation of nearly 1200 operations and crucial blood tests, has urged against blaming them for the hardships faced by Britain’s healthcare system. Instead, they pointed fingers…
Top 10 Industries Most Vulnerable to Cyber Attacks
Cybersecurity threats continue to pose significant challenges across various industries, with certain sectors bearing the brunt of frequent and severe cyber attacks. Here’s a closer look at the top 10 industries most vulnerable to cyber attacks: 1. Healthcare: The healthcare…
Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices
Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet their operational objectives by masquerading it as Instagram, WhatsApp, and various e-commerce and antivirus apps. “It provides malicious actors with…
New RAT Malware SneakyChef & SugarGhost Attack Windows Systems
Talos Intelligence has uncovered a sophisticated cyber campaign attributed to the threat actor SneakyChef. This operation leverages the SugarGh0st RAT and other malware to target government agencies, research institutions, and various organizations worldwide. The campaign began in early August 2023…
The End of Our Dog Era
“That’s the end of our Joplin era,” my wife said to my oldest daughter. We were still crying and wiping our tears. I didn’t say it out loud, but I thought “That was the end of our dog era,” We’d…
Securing the video market: From identification to disruption
Video piracy, a pressing issue often unnoticed in security discussions, is rising and demands immediate attention. In this Help Net Security video, Chris White, Chief Architect at Friend MTS, discusses monitoring, identifying, and disrupting piracy for the video market. He…
Why are threat actors faking data breaches?
Earlier this year Europcar discovered a hacker selling info on its 50 million customers on the dark web. The European car rental company immediately launched an investigation, only to discover that the data being sold was completely doctored, possibly using…
Cracking down on cybercrime: Who you gonna call?
As cybercrime continues to grow, law enforcement agencies worldwide face increased challenges in safeguarding organizations and individuals. In this article, we highlight law enforcement agencies that have scored notable successes against cybercriminals in recent years. FBI: Cyber Division Headquarters: Washington,…