Category: Information Security Buzz

50% of M&A Security Issues are Non-Malicious

More than half of M&A security incidents in 2024 were non-malicious, resulting instead from integration-induced investigation delays, policy and compliance challenges, and issues baselining internal tools, a report from ReliaQuest has revealed. These findings suggest that inherited assets present a…

Brand Impersonations Surge 2000% During Black Friday

Phishing scams impersonating major holiday brands like Walmart, Target, and BestBuy increased by more than 2000% during Black Friday week, new research from Darktrace has revealed. These findings come as part of a wider increase in phishing activity during the…

The Next Frontier: Predictions Driving Tech and Security in 2025

As we unveil the third edition of Information Security Buzz’s 2025 predictions, we are thrilled by the incredible response. In this installment, we dive even deeper into the evolving cybersecurity landscape, where advancements in AI, quantum computing, and cloud technologies…

Data Governance and the Mandate for Tougher Security in 2025

The challenges around data governance are evolving rapidly, driven by the rapid adoption of generative AI, stringent regulatory requirements, and heightened cybersecurity risks. As we approach 2025, organisations are realising that traditional approaches to data governance are no longer sufficient.…

New Report Highlights Open Source Trends and Security Challenges

The Linux Foundation, in collaboration with the Laboratory for Innovation Science at Harvard, has unveiled a comprehensive study, “Census III of Free and Open Source Software – Application Libraries (Census III).” The report identifies the most widely used free and…

Developing Responsible AI in 2025: The Path to Trust and Compliance

Artificial intelligence (AI) is transforming industries at an unprecedented pace, offering solutions to some of the world’s most complex challenges. But with its immense potential come significant risks—bias, discrimination, data privacy breaches, and security vulnerabilities. Governments worldwide have enacted AI…

Avoiding cyber complacency as a small business

As a small business owner reading endless news stories about cyberattacks against well-known enterprise names, it can be easy to think it won’t happen to you. In reality, hackers don’t discriminate: businesses of all sizes can and do find themselves…

Critical Vulnerabilities Found in Veeam Service Provider Console

Two critical vulnerabilities (CVE-2024-42448 and CVE-2024-42449) have been identified in Veeam Service Provider Console (VSPC), prompting an urgent call for users to update their systems. According to Veeam’s latest security advisory, the vulnerabilities affect all builds of VSPC versions 7…

SmokeLoader Malware Targets Companies in Taiwan

A sophisticated cyberattack using the SmokeLoader malware targeted multiple industries in Taiwan in September 2024, new research from FortiGuard Labs has revealed. SmokeLoader is notorious for its versatility, advanced evasion techniques, and modular design, which allow it to perform a…

Anticipating Change: Key Cybersecurity Trends to Watch in 2025

Thanks to the fantastic response we received, we’re excited to continue our exploration of the evolving cybersecurity landscape. As we approach 2025, the challenges and threats facing businesses, governments, and individuals are becoming increasingly complex. Following our initial insights, we…

As Device Dependency Grows, So Do the Risks

It’s no stretch to say connected devices are taking over the world. In every sector and country, endpoints are driving newfound efficiencies inside the smart home, office, and warehouse. These devices – from sensors to smart meters and industrial controllers…

SpyLoan Apps: The New Face of Financial Exploitation

The McAfee mobile research team has identified a significant global rise in predatory loan applications, commonly referred to as SpyLoan apps, which primarily target Android users. These applications, classified as potentially unwanted programs (PUP), utilize social engineering tactics to manipulate users…

Godot Gaming Engine Exploited to Spread Undetectable Malware

Check Point Research has discovered that cybercriminals are exploiting the popular Godot Engine to spread malware, bypassing detection by nearly all antivirus solutions. The new technique uses Godot’s scripting language, GDScript, to deliver malicious payloads through a loader dubbed “GodLoader,”…

Shop Smart, Stay Safe: Black Friday Edition

As Black Friday approaches, shoppers eagerly hunt for bargains online, but so do malicious actors. Cyber criminals are like pick-pockets, they go where the crowds are, so this high-traffic shopping season presents a smorgasbord of opportunities for malefactors to exploit…

Phishing Attacks Dominate Threat Landscape in Q3 2024

Spearphishing attacks with links and attachments increased in Q3 2024, accounting for 46% of security incidents, ReliaQuest’s Top Cyber Attacker Techniques report has revealed. Initial access methods like spear phishing were the most common MITRE ATT&CK techniques last quarter and have…

How to Back Up Proxmox Data with NAKIVO Backup & Replication

Proxmox Virtual Environment (VE) is a Debian Linux-based virtualization management platform with a customized kernel. Proxmox fully integrates the KVM hypervisor to enable deployment and efficient management of VMs using a user-friendly GUI. This is a free, open-source solution that…

What is CMMC 2.0? And Why is Compliance Crucial?

In an era of increasingly sophisticated cyber threats, the U.S. Department of Defense (DoD) has introduced the Cybersecurity Maturity Model Certification 2.0 (CMMC 2.0) to bolster the cybersecurity posture of its Defense Industrial Base (DIB). This updated framework aims to…

Growing Matrix Botnet Poses Escalating Global Threat

The Matrix botnet is expanding at an alarming rate, with nearly 35 million devices currently vulnerable to compromise. Researchers from Aqua Nautilus who uncovered the threat, warn that even a fraction of these devices falling into the botnet’s control could…

VPN Vulnerabilities Drive Nearly 30% of Q3 Ransomware Attacks

Attackers leveraging vulnerabilities in Virtual Private Networks (VPNs) and exploiting weak passwords accounted for 28.7% of ransomware incidents in Q3 2024, according to Corvus Insurance’s latest Cyber Threat Report. Common credentials like “admin” and a lack of multi-factor authentication (MFA)…

Expert Cybersecurity Predictions for 2025: What Lies Ahead?

As the digital landscape evolves, so do the threats and challenges defining cybersecurity. With 2025 around the corner, ISB reached out to several experts to forecast transformative shifts in how businesses, governments, and individuals protect themselves against increasingly sophisticated cyberattacks.…

Ten Security and Privacy Compliance Requirements for All

The regulatory landscape for data privacy and cybersecurity continues to evolve, presenting significant challenges for organisations worldwide. Key developments include the proliferation of global data privacy laws, the emergence of AI-focused regulations, the implementation of the Cybersecurity Maturity Model Certification…

Malware Turns Trusted Avast Driver Into a Weapon

In a chilling discovery, Trellix Advanced Research Center has uncovered a malicious campaign that turns trusted security tools into instruments of attack. The malware manipulates Avast’s Anti-Rootkit driver (aswArPot.sys) to gain deep system access, disable protective measures, and take full…

Securing the Future: Why Your Business Needs to Prioritize API Security Now

In today’s digital-first world, APIs are the lifelines connecting different software applications, enabling seamless interactions and data exchange. As businesses increasingly adopt digital transformation strategies, the reliance on APIs has skyrocketed. However, this growing dependency comes with its own set…

Australia Introduces Bill to Ban Kids from Social Media

The Australian Government has unveiled world-first legislation setting a minimum age of 16 for social media use, aiming to bolster online safety for young Australians. The Online Safety Amendment (Social Media Minimum Age) Bill 2024, introduced today, seeks to protect…

Unmasking WolfsBane: Gelsemium’s New Linux Weapon

ESET researchers have uncovered WolfsBane, a Linux cyberespionage backdoor attributed with high confidence to the Gelsemium advanced persistent threat (APT) group. This discovery is a major development, as it is the first public report of Gelsemium deploying Linux malware. The…

Avoiding Common API Security Mistakes

Application Programming Interfaces (APIs) have become the backbone of modern software development, enabling seamless communication between different systems. However, with this increased reliance on APIs comes a heightened need for robust security measures. Read on to explore the critical importance…

Attackers Hijack Misconfigured Servers for Live Sports Streaming

In a surprising discovery, Aqua Nautilus researchers have identified an emerging attack vector that leverages misconfigured servers to hijack resources for streaming sports events. Using honeypots designed to mimic real-world development environments, researchers uncovered how attackers exploited JupyterLab and Jupyter…

5 Questions CISOs Should Be Asking Regarding DSPM

The Data Security Posture Management (DSPM) market is on a meteoric rise, and CISOs are taking note. Gartner predicts that by 2026, one in five organizations will have invested in the technology (up from only 1% in 2022). But in…

Microsoft Vulnerability Poses Risk to Domain Control

A recently disclosed flaw in Microsoft Active Directory Certificate Services (ADCS), identified as CVE-2024-49019, could allow attackers to escalate privileges and gain control of a domain. The vulnerability, rated with a CVSS score of 7.8, is classified as an elevation-of-privilege…

T-Mobile Among Telecom Giants Hit by China-Linked Cyberattack Campaign

T-Mobile has confirmed its involvement in the recent wave of telecom network breaches, which have been attributed to a China-linked cyber threat group, Salt Typhoon. The malicious actor previously breached major telecom providers, including AT&T, Verizon, and Lumen Technologies, as…

Beyond the EU: How British Businesses Can Prepare for NIS2

The European Union’s (EU) Network and Information Security Directive 2 (NIS2) came into force across Europe on 17 October 2024, aiming to strengthen cybersecurity across various sectors, including critical infrastructure and digital services. It was built on the foundations of…

NIST Publishes Draft Strategy for Post-Quantum Cryptography Transition

The National Institute of Standards and Technology (NIST) has published its initial draft strategy, Internal Report (IR) 8547, titled “Transition to Post-Quantum Cryptography Standards. ” This draft outlines NIST’s strategy for migrating from current cryptographic algorithms vulnerable to quantum computing…

Fortra Reports Alarming Increase in Abuse of Cloudflare Services

Cloudflare’s Pages and Workers platforms have experienced a surge of malicious activity in the past year, research from Fortra’s Suspicious Email Analysis (SEA) team has revealed. Phishing incidents on Cloudflare Pages have surged nearly 200% over the past year, while…

Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector

In a new and sophisticated cyber campaign dubbed the “Iranian Dream Job Campaign,” the Iranian threat group TA455 is using deceptive job offers to infiltrate the aerospace industry, ClearSky Cyber Security reported. The campaign relies on distributing SnailResin malware, which…

Google Debuts Online Fraud and Scams Advisory

Google has launched a regular fraud and scams advisory to combat the growing volume and sophistication of online scams. Multinational crime entities are increasingly using advanced technology and complex schemes to target victims worldwide. To protect users and the broader…

Ransomware Attacks on Healthcare Sector Surge in 2024

Ransomware attacks on the healthcare sector surged in 2024, analysis from SafetyDetectives reveals. The year has already seen 264 attacks on healthcare providers by September, nearly surpassing the 268 attacks recorded for all of 2023. Escalating Cyber Threats SafetyDetectives argues…

Cyware Attains FedRAMP Ready Status

Cyware, a provider of threat intelligence management and cyber fusion solutions, has attained Federal Risk and Authorization Management Program (FedRAMP) Ready status. With FedRAMP Ready status, Cyware says it is positioned to accelerate the authorization process, facilitate broader implementation of…

Volt Typhoon Gang and Botnet Re-Emerge Targeting Critical Infrastructure

Volt Typhoon, a stealthy and resilient state-sponsored cyber-espionage group has re-emerged as a severe and silent threat to critical infrastructure worldwide, demonstrating increased sophistication and determination. In January this year, the US Department of Justice said it disrupted the People’s…

Sophisticated Infostealers Top Malware Rankings

Cybercriminals are leveraging increasingly sophisticated attack methods, including the strategic deployment of infostealers, research from Check Point Software’s October 2024 Global Threat Index reveals.  The report also notes that the ‘Lumma Stealer’ malware, which leverages fake CAPTCHA pages to infiltrate…

New Phishing Campaign Delivers Advanced Remcos RAT Variant

Fortinet’s FortiGuard Labs has uncovered a sophisticated phishing campaign distributing a new variant of the Remcos Remote Access Trojan (RAT). The campaign begins with a phishing email containing a malicious Excel document designed to exploit vulnerabilities and deliver the Remcos…

Six Questions to Ask Your Would-Be SIEM Provider

Gathering and deciphering data insights for usable solutions forms the foundation of a strong cybersecurity strategy. However, organizations are swimming in data, making this task complex. Traditional Security Information and Event Management (SIEM) tools are one method that organizations have…

An Ultimate Guide to Exchange Server Database Recovery

Databases in Exchange Server play a crucial role in the smooth functioning of an organization as all the critical information, such as emails, contacts, tasks, notes, calendars, etc., is stored in them. Sometimes, databases become corrupted due to server failure…

Malicious PyPI Package Steals AWS Credentials

A malicious package on the Python Package Index (PyPi) has been quietly exfiltrating Amazon Web Service credentials from developers for over three years, a new report from cybersecurity researchers at Socket has revealed.  The package “fabrice” is a typosquat of the…

Ciso Playbook: Cyber Resilience Strategy

In this era of advanced technology, cyber threats are on the rise, and they’re evolving with cutting-edge finesse. As we continue to witness a rise in the frequency and sophistication of cyber-attacks, recent hacker incursions into high-profile enterprises like Equifax, Uber, Facebook, and Capital…

Credential Abuse Market Flourishes Despite Setbacks

Despite the recent takedown of the RedLine malware variant and a crackdown on “problematic” Telegram content, the credential abuse market is as vibrant as ever. This was revealed by new research from ReliaQuest. According to the company, cybercriminals appear undeterred by…

New Malware Campaign Targets Windows Users Through Gaming Apps

A new malware strain, Winos4.0, is actively used in cyberattack campaigns. Discovered by FortiGuard Labs, this advanced malicious framework, which evolved from the infamous Gh0strat, is equipped with modular components enabling a range of malicious activities on compromised devices. These…

JFrog Uncovers Critical Vulnerabilities in Machine Learning Platforms

Software supply chain company JFrog revealed on Monday that it had discovered 22 software vulnerabilities across 15 machine learning-related open-source software projects. The results, presented in JFrog’s latest ML Bug Bonanza blog, shed light on the security challenges organizations face…

CISA’s Cyber Hygiene Services

We all know CISA as the governing agency for federal cybersecurity and the national operating hub for critical infrastructure security. But what are the free critical cyber hygiene services provided by the Cybersecurity and Infrastructure Security Agency (CISA), and how…

Google’s Big Sleep AI Tool Finds Zero-Day Vulnerability

In a major breakthrough, Google’s AI-powered research tool, Big Sleep, discovered a vulnerability in SQLite, one of the most widely used database engines in the world. The Google Project Zero and Google DeepMind teams recently shared this milestone in an…

AI & API Security

Artificial Intelligence (AI) and Application Programming Interfaces (APIs) are integral to technological advancement in today’s digital age. As gateways allowing different software applications to communicate, APIs are crucial in AI’s evolution, powering everything from cloud computing to machine learning models.…

Proactive Ways To Bridge The Cybersecurity Talent Gap

The need for robust cybersecurity measures has never been greater in a time when cyber threats are evolving rapidly, and breaches have become an inevitability for businesses in every sector. Managing this complex threat landscape requires advanced solutions and skilled experts who…

The Invisible Shield: Beyond Wrap-around Cyber Protection

Cyber threats are evolving at an unprecedented pace.  AI-driven malware, sophisticated phishing schemes, and adaptive attack methods are outmaneuvering standard security measures. Traditional defenses are no longer sufficient. Businesses need an invisible shield that offers comprehensive, proactive protection to stay…

A Halloween Haunting: Unveiling Cybersecurity’s Scary Stats

This Halloween, it’s not just ghosts and goblins sending chills down our spines—this season brings some truly spine-tingling stats about the state of cybersecurity in 2024. In our “Spooky Security Stats” roundup, we’re revealing findings from several reports published over…

3 Key DSPM Takeaways from the Latest Gartner Report

Data Security Posture Management (DSPM) is a rising star in the cybersecurity world, and for good reason. With so many diverse environments, complex pipelines, and random repositories, important data often ends up in the wrong places, or worse – lost…

US Joins International Crackdown on RedLine and META Infostealers

The US Department of Justice, in collaboration with international law enforcement partners, has launched a major crackdown on RedLine and META, two of the world’s most prolific infostealer malware variants responsible for stealing sensitive data from millions of victims worldwide.…

Malicious npm Packages Found to Distribute BeaverTail Malware

Three malicious packages uploaded to the npm registry were discovered to harbor BeaverTail, a JavaScript downloader and information stealer associated with a continuing North Korean campaign known as Contagious Interview. The packages—passports-js, bcrypts-js, and blockscan-api collectively amassed 323 downloads, and…

Safely Scale Your Data Center With These Five Cybersecurity Measures

Datacenter cybersecurity is critical because of the vast industries using these facilities. Healthcare, finance, education, and other sectors rely on this storage solution to protect records and sensitive information. Companies may adjust their storage needs based on demand, so understanding…

US Energy Sector Faces Growing Cybersecurity Threats

A recent cybersecurity report by SecurityScorecard and KPMG reveals that the US energy sector remains at high risk of cyber threats, particularly from third-party sources. This analysis, evaluating 250 top US energy companies, highlights vulnerabilities across the energy supply chain—from…

A Dangerous Alliance: Scattered Spider, RansomHub Join Forces

ReliaQuest has released a detailed investigation into a cyber intrusion that impacted a manufacturing company in October 2024. The attack has been attributed with high confidence to the predominantly English-speaking cyber collective “Scattered Spider,” now partnering with the notorious “RansomHub”…

Five Ways to Improve Your Security Posture, Fast

Cybersecurity has become a critical concern for businesses of all sizes. With cyber threats becoming more sophisticated and frequent, the cost of cybersecurity breaches continues to rise dramatically. In fact, the Netwrix 2024 Hybrid Security Trends Report found that 79% of organizations…

Attackers Exploit Roundcube Webmail Vulnerability

Cybersecurity experts from Positive Technologies’ Security Expert Center (PT ESC) have uncovered an exploit targeting Roundcube Webmail, an open-source email client written in PHP.   According to the researchers, Roundcube’s “extensive functionality and the convenient access it gives users to email accounts via a browser—without the…

Cyber Attackers Set Their Sights on Manufacturing

The manufacturing industry has emerged as the most targeted by cyber attacks, accounting for more than 25% of incidents across the top 10 sectors, with 45% of these involving malware. The industry’s appeal to malefactors has grown, largely due to…

Nearly half (44%) of CISOs Fail to Detect Breaches

A staggering 44% of CISOs were unable to detect a data breach in the last 12 months using existing security tools. Moreover, nearly three-quarters (70%) of CISOs feel their current security tools are ineffective at detecting breaches due to limited…