In today’s rapidly evolving digital landscape, Cybersecurity Advisory Boards (CABs) are crucial in helping organizations navigate the complexities of today’s digital landscape. By bringing together industry leaders, CABs provide strategic insights, foster collaboration, and ensure cybersecurity strategies stay ahead of…
Category: Information Security Buzz
Ransomware Attacks, Demands, and Payments Rise in Q2
In Q2 2024, new ransomware groups, including PLAY, Medusa, RansomHub, INC Ransom, BlackSuit and some additional lesser-known factions, led a series of attacks that eclipsed the first quarter of this year by 16% and the second quarter of 2023 by…
Prism Infosec Debuts Red Team Engagement Service
Prism Infosec, an independent cybersecurity consultancy,has introduced PULSE testing service. The service aims to help entities that may not have the resources to dedicate to a full-scale red team exercise and assess their defense capabilities against real-world threats. The company…
The Evolving Landscape of Identity and Access Management in 2024
In the digital age, where cyber threats are increasingly sophisticated and data privacy regulations are more stringent than ever, Identity and Access Management (IAM) has become a cornerstone of organizational security. As we navigate through 2024, the IAM landscape continues…
FIDO Alliance Releases Authenticate 2024 Agenda
The FIDO Alliance has announced its agenda today for Authenticate 2024, the only industry conference dedicated to all aspects of user authentication. The event will be held from 14 to 16 October 2024 at the Omni La Costa Resort and Spa in Carlsbad,…
Qilin Targets Chrome-Stored Credentials in “Troubling” New Attack
The Qilin ransomware group, already infamous for its devastating attacks, has now been caught stealing credentials stored in Google Chrome browsers. This new tactic could amplify the chaos typically associated with ransomware breaches, spreading the impact far beyond the initial…
Millions of Office and Hotel RFID Smart Cards Vulnerable to Instant Cloning Through Hidden Backdoor
Researchers from Quarkslab have uncovered critical vulnerabilities in the latest variant of MIFARE Classic compatible cards. Despite being touted as a secure alternative, the FM11RF08S card, developed by Shanghai Fudan Microelectronics, has been found to contain a hardware backdoor, among…
Navigating the Challenges of AI in Software Development: A Call to Action to Comply with the EU AI Act
In today’s rapidly evolving software development landscape, Artificial Intelligence (AI) and Machine Learning (ML) have emerged as significant threat vectors. Organizations worldwide are witnessing a surge in targeted attacks aimed at software developers, data scientists, and the infrastructure supporting the…
Extortion Campaign Targets 110,000 Domains Using Exposed AWS Files
A sophisticated cloud extortion campaign has compromised over 110,000 domains by exploiting misconfigured Amazon Web Services (AWS) environment variable (.env) files. By scanning for exposed .env files on unsecured web applications, threat actors were able to obtain AWS Identity and…
Innovative Phishing Campaign Targets Mobile Users with PWAs
In a new twist on phishing tactics, ESET analysts have uncovered a series of sophisticated campaigns targeting mobile users by leveraging Progressive Web Applications (PWAs). This use of PWAs, which are essentially websites functioning as standalone apps, sets this phishing…
US Intelligence Agencies Warn of Iranian Election Influence Efforts
In a joint statement, the Office of the Director of National Intelligence (ODNI), the Federal Bureau of Investigation (FBI), and the Cybersecurity and Infrastructure Security Agency (CISA) have warned about heightened Iranian efforts to interfere in the upcoming US elections.…
FlightAware Notifies Users of Data Security Incident
FlightAware, a provider of real-time flight tracking information, has informed users of a data security incident that may have exposed personal information. The company is taking precautionary measures by requiring all potentially impacted users to reset their passwords. The incident,…
Cyberattack Forces Microchip Technology to Scale Back Amid Global Chip Race
Microchip Technology Inc. announced Tuesday that it had been targeted by a cyberattack, prompting the US chipmaker to shut down some systems and reduce its operations. According to a regulatory filing, Microchip, a key supplier to the US defense industry,…
10 Strategies for Safely Migrating a Data Center on a Limited Budget
Data centers have become integral to modern companies, considering the amount of information necessary for operations. These systems remain in place most of the time, but your business could determine it is time to move. How can you ensure safety…
5 Emerging Malware Variants You Must Be Aware Of
The cybersecurity landscape is marked by sophisticated malware strains designed to harvest sensitive data, get a foothold on company networks, and generally wreak havoc. A new report from ReliaQuest examines five malware variants that have recently impacted the threat landscape…
Ransom Denied: Cyber Insurance Claims Shrink as Businesses Opt for DIY Recovery
Claims on cyber insurance have dropped by more than a third between 2022 and 2024, despite more organizations than ever having this type of cover. This was revealed in Databarracks’ Data Health Check – an annual survey of 500 UK…
Ransomware’s Record Year: 2024 Earnings Soar Amid Overall Cybercrime Dip
In a year marked by significant shifts in the cybercrime landscape, 2024 is on track to become the highest-grossing year for ransomware, even as overall illicit activity on the blockchain has declined by nearly 20% year-to-date. This trend highlights the…
Interoperability in Healthcare: How APIs are Bridging the Gap
Interoperability is the lifeblood of the modern healthcare sector. Effective patient care relies on the ability of disparate healthcare systems, devices, and applications to seamlessly access, exchange, and ultimately use data; without interoperability, this would not be possible. A failure…
Ransomware Gangs Introduce New EDR-Killing Tool
Sophos researchers have uncovered a new tool, EDRKillShifter, that malicious actors are using to target endpoint detection and response (EDR) systems. The discovery came after an unsuccessful ransomware attack in May. The threat actors deployed the tool to disable endpoint…
National Public Data Admits to Breach Leaking Millions of Social Security Numbers
Background check provider National Public Data (NPD) has confirmed a data breach after hackers leaked a stolen database containing millions of Social Security numbers and other sensitive information. The compromised data reportedly includes names, email addresses, phone numbers, Social Security…