November 2023 saw a rise to 39 events, with Cyber Crime remaining dominant at 78.7%. Cyber Espionage increased to 9.7%, while Hacktivism fell to 5.4%. Malware was the leading attack technique at 42.1%, and Multiple Organizations were the most targeted…
Category: EN
Netherlands Fines Uber Over Data Protection
Dutch regulators impose a 10 million euro ($10.8 million) fine on ride-hailing app Uber for lack of transparency in treating the personal data of its drivers. The post Netherlands Fines Uber Over Data Protection appeared first on SecurityWeek. This article…
Cloudflare Hacked by Suspected State-Sponsored Threat Actor
A nation-state threat actor accessed internal Cloudflare systems using credentials stolen during the Okta hack. The post Cloudflare Hacked by Suspected State-Sponsored Threat Actor appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Cloudflare breached on Thanksgiving Day, but the attack was promptly contained
Cloudflare revealed that a nation-state actor breached its internal Atlassian server, gaining access to the internal wiki and its bug database (Atlassian Jira). The incident took place on Thanksgiving Day, November 23, 2023, and Cloudflare immediately began an investigation with…
Cloudzy Elevates Cybersecurity: Integrating Insights from Recorded Future to Revolutionize Cloud Security
Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough has been achieved through a recent consultation with Recorded Future, a leader in providing real-time threat intelligence and cybersecurity analytics. This initiative, coupled…
Former CIA Engineer Sentenced to 40 Years for Leaking Classified Documents
A former software engineer with the U.S. Central Intelligence Agency (CIA) has been sentenced to 40 years in prison by the Southern District of New York (SDNY) for transmitting classified documents to WikiLeaks and for possessing child pornographic material. Joshua…
Cloudflare Suffers Breach After Failing to Rotate Stolen Okta Credentials
Cloudflare revealed suspected nation-state attackers compromised its systems and accessed source code using credentials stolen in the Okta breach This article has been indexed from www.infosecurity-magazine.com Read the original article: Cloudflare Suffers Breach After Failing to Rotate Stolen Okta Credentials
Exploring the Latest Mispadu Stealer Variant
Evaluation of a new variant of Mispadu, a banking Trojan, highlights how infostealers evolve over time and can be hard to pin to past campaigns. The post Exploring the Latest Mispadu Stealer Variant appeared first on Unit 42. This article…
Ex-CIA Computer Engineer Gets 40 Years in Prison for Giving Spy Agency Hacking Secrets to WikiLeaks
Former CIA software engineer sentenced to 40 years in prison for biggest theft of classified information in CIA history and for possession of child sexual abuse images and videos. The post Ex-CIA Computer Engineer Gets 40 Years in Prison for…
INTERPOL Arrests 31 in Global Operation, Identifies 1,900+ Ransomware-Linked IPs
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of 1,300 suspicious IP addresses and URLs. The law enforcement effort, codenamed Synergia, took place between September and November 2023 in an attempt to blunt the…
PurpleFox malware infected at least 2,000 computers in Ukraine
The Computer Emergency Response Team in Ukraine (CERT-UA) reported that a PurpleFox malware campaign had already infected at least 2,000 computers in the country. The Computer Emergency Response Team in Ukraine (CERT-UA) is warning about a malware campaign that has…
Verimatrix partners with AWS to increase reliability for OTT content security
Verimatrix collaboration with AWS to further bolster scalability, availability and ease of use for its Streamkeeper Multi-DRM cloud-based OTT content security platform. Streamkeeper Multi-DRM, a multi-tenant platform deployed on the AWS cloud, is compatible with AWS SPEKE to work seamlessly…
LockBit Reigns Supreme in Soaring Ransomware Landscape
The last quarter of 2023 saw an 80% year-on-year increase in ransomware victim claims, according to ReliaQuest This article has been indexed from www.infosecurity-magazine.com Read the original article: LockBit Reigns Supreme in Soaring Ransomware Landscape
What is Mark Zuckerberg preparing for?
Meta’s CEO, Mark Zuckerberg, has spent over a quarter of a billion on a property in Kauai, Hawaii. The tech billionaire splurged nearly 200 million… The post What is Mark Zuckerberg preparing for? appeared first on Panda Security Mediacenter. This…
State-of-the-Art Redis Malware Bypasses Security Solutions to Hack Servers
Discovering a clandestine and potent menace, Aqua Nautilus researchers have brought to light the HeadCrab, an advanced threat actor wielding bespoke malware targeting Redis servers globally. Redis, an open-source, in-memory data structure store, serves as the unsuspecting battleground for the…
How Does Cybersecurity Services Prevent Businesses From Cyber Attacks?
In the contemporary digital landscape, new threats emerge constantly. If someone connects to the Internet, it exposes organizations to the risk of being targeted by hackers. Cyber threats have advanced into the industry, making security an important aspect of spreading…
Change Your Password Day professes a cybersecurity message
On February 1, 2024, the globe commemorated International Change Your Password Day, an occasion unfamiliar to many tech enthusiasts regarding its origin. This annual observance was initially established to promote online safety while accessing web services, emphasizing the critical role…
Benefits on sharing cyber attack information
Sharing information about cyber attacks provides several benefits to individuals, organizations, and the broader cybersecurity community. Here are some key advantages: 1. Early Threat Detection: Information sharing enables early detection of cyber threats. When organizations share details about the attacks…
Ivanti discloses 2 New zero-days, one already under exploitation
Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products that are assigned with CVE-2024-21888 and CVE-2024-21893. Additionally, one of the vulnerabilities (CVE-2024-21893) has been reported to be exploited by threat actors in the…
Shifting Left Means Shifting Smart: Managing Software Risk With ASPM
By Natasha Gupta, Senior Security Solutions Manager, Synopsys Software Integrity Group As organizations embrace digital transformation efforts to speed up software delivery, security practices have had to evolve. Development teams […] The post Shifting Left Means Shifting Smart: Managing Software…