This year’s Cybersecurity Awareness Month theme, “Secure Our World,” emphasizes the importance of simple yet powerful measures everyone can take to protect their businesses, data, and loved ones. While there is no silver bullet to safeguard against all cyber threats,…
Category: Information Security Buzz
Passkeys and Cybersecurity Awareness: A New Era of Business Security
This year, Cybersecurity Awareness Month is themed “Secure Our World,” a stark reminder that simple measures can protect businesses from online threats. The week emphasizes four key strategies: using strong passwords and password managers, turning on multifactor authentication (MFA), recognizing…
More Evil Corp Actors Exposed, Including LockBit Affiliate
In a significant move against one of the world’s most notorious cybercrime groups, the UK has sanctioned 16 individuals linked to Evil Corp, a criminal organization with ties to the Russian state. Among those newly exposed is a key affiliate…
Ambulances Still Diverted as UMC Faces Ongoing Cybersecurity Incident
University Medical Center (UMC) is still grappling with the aftermath of a ransomware attack that occurred last Thursday. The attack caused a widespread IT outage and forced the diversion of emergency and non-emergency patients to nearby facilities. While some services…
Book Review: “Premier CISO – Board & C-Suite” by Michael S. Oberlaender
In his latest work, Premier CISO -Board & C-Suite, Michael S. Oberlaender delivers a comprehensive guide for aspiring and current Chief Information Security Officers (CISOs) navigating the complex landscape of cybersecurity leadership. This book, the third in Michael’s series on…
Three Iranian Cyber Actors Indicted for Election Interference and Hacking Campaign
The U.S. Department of Justice (DOJ) has indicted three Iranian nationals linked to the Islamic Revolutionary Guard Corps (IRGC) for orchestrating a cyberattack aimed at influencing the 2024 US presidential election. The indictment, unsealed today, charges Masoud Jalili, Seyyed Ali…
Critical Infrastructure at Risk: Vulnerabilities Discovered in Automatic Tank Gauging
A recent investigation by Bitsight TRACE has uncovered several critical 0-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. These vulnerabilities are substantial real-world threats, with the potential for exploitation by malicious actors, leading to severe…
The Rise of API Security Automation: Defending the Digital Frontlines with AI and Machine Learning
APIs (Application Programming Interfaces) are the backbone of modern digital services, driving the seamless flow of data and functionality between applications. From enabling quick social media logins to processing payments and connecting complex systems, APIs have revolutionized how businesses operate…
CISA Urges Action as Attackers Exploit Critical Systems Using Basic Tactics
The Cybersecurity and Infrastructure Security Agency (CISA) has once again raised alarms about the ongoing exploitation of operational technology (OT) and industrial control systems (ICS) across critical infrastructure sectors. The warning comes amid an active investigation into a cybersecurity incident…
Kia Vulnerability Enables Remote Access to Millions of Cars Using Just a License Plate
Cybersecurity researchers identified critical vulnerabilities in Kia vehicles, revealing that attackers could remotely control cars using only a license plate number. The vulnerabilities were first identified in June this year and have since been patched, but the potential impact has…
Mozilla Faces Legal Complaint Over Firefox’s New “Privacy Preserving” Tracking Feature
Non-profit privacy watchdog noyb (None of Your Business) has filed a formal complaint against Mozilla, accusing the tech company of enabling a controversial tracking feature in its Firefox browser without user consent. The feature, dubbed “Privacy Preserving Attribution” (PPA), was…
The AI-Cybersecurity Paradox: How AI is Revolutionizing Defenses While Empowering Hackers
In the rapidly evolving digital security landscape, artificial intelligence (AI) has emerged as both a powerful ally and a formidable adversary. As we navigate through 2024, the cybersecurity industry finds itself at a critical juncture, grappling with what experts call…
Dell’s Security Woes Deepen: Attackers Strike Twice in One Week
Hackers have allegedly carried out a second Dell data breach within a week, compromising sensitive internal files via Atlassian tools. Allegedly, data from Jira, Jenkins, and Confluence has been exposed. Dell is currently investigating the initial breach. On 19 September…
CISA Releases Guide to Empower Software Buyers in Creating a Secure Tech Ecosystem
Recognizing that cyber criminals increasingly exploit software vulnerabilities, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has taken the lead with a new resource for software customers—the “Secure by Demand Guide.” The Guide is part of CISA’s ongoing effort to…
PECB Conference 2024: A Global Forum for IT, Security, and Privacy Professionals
The PECB Conference 2024 is set to take place from 30 September to 3 October at the Van der Valk Hotel Breukelen in Amsterdam. This annual event will gather global experts, thought leaders, and professionals to explore the latest trends…
Cybersecurity in E-Commerce
In any organization, regardless of the industry or the size, cybersecurity is one of the most pressing concerns to handle. Some companies, especially those that store and manage large amounts of sensitive data and those that operate primarily in the…
Underfunding and Leadership Gaps Weaken Cybersecurity Defenses
Despite cyber risk growing at an alarming rate, a recent global study from Trend Micro, highlights that many organizations are failing to implement adequate cybersecurity measures due to a lack of strategic leadership and investment. Key Findings of the Report…
Necro Trojan Strikes Google Play Again, Infecting Popular Apps
In a troubling development, the Necro Trojan has resurfaced on Google Play, infecting popular applications and reaching millions of Android devices worldwide. Kaspersky’s cybersecurity researchers discovered the Necro malware in various apps, including some available on official app stores like…
Generative AI Fuels New Wave of Cyberattacks, HP Warns
Attackers are employing AI-generated scripts, leveraging malvertising to distribute rogue PDF tools, and embedding malware in image files. These developments mark a significant shift in the threat landscape, accelerating the frequency and complexity of cyberattacks. This was revealed by HP’s…
UN Report on Governing AI for Humanity – Key Recommendations and Insights
The United Nations (UN) Secretary-General’s High-level Advisory Body on Artificial Intelligence (HLAB-AI) released a comprehensive report titled “Governing AI for Humanity,” which proposes global governance mechanisms for Artificial Intelligence (AI). The report is based on extensive consultations and presents a…