The suspected China-based cyber espionage actor has been attributed with a prolonged cyber espionage attack that lasted approximately three years against an unnamed organization based in East Asia, in which the adversary allegedly established persistence using legacy F5 BIG-IP…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
New ARM ‘TIKTAG’ Attack Affects Google Chrome and Linux Systems
A newly identified speculative execution attack named “TIKTAG” exploits ARM’s Memory Tagging Extension (MTE) to leak data with a success rate exceeding 95%, allowing hackers to circumvent this security feature. This discovery was detailed in a paper by researchers…
Notorious Cyber Gang UNC3944 Shifts Focus to SaaS Apps vSphere and Azure
The notorious cyber gang UNC3944, which is suspected of involvement in the recent attacks on Snowflake and MGM Entertainment, among other things, has modified its methods and is now targeting SaaS apps. According to Google Cloud’s Mandiant threat intelligence…
Securing Sensitive Data: Lessons from Keytronic’s Recent Breach
Keytronic, a prominent printed circuit board assembly (PCBA) manufacturer, recently confirmed a significant data breach. The breach occurred after the Black Basta ransomware gang leaked over 500GB of the company’s stolen data. In this blog post, we delve into the…
Why Enterprise Editions of Open Source Databases Are Essential for Large Organizations
With the digital age ushering in massive data flows into organizational systems daily, the real value of this data lies in its ability to generate critical insights and predictions, enhancing productivity and ROI. To harness these benefits, data must be…
Here’s How Technology is Enhancing the Immersive Learning Experience
In the ever-changing environment of education, a seismic shift is taking place, with technology emerging as a change agent and disrupting conventional approaches to learning. Technology bridges the gap between theoretical knowledge and practical application, especially in the transformative…
Apple’s Private Cloud Compute: Enhancing AI with Unparalleled Privacy and Security
At Apple’s WWDC 2024, much attention was given to its “Apple Intelligence” features, but the company also emphasized its commitment to user privacy. To support Apple Intelligence, Apple introduced Private Cloud Compute (PCC), a cloud-based AI processing system designed…
Sandton Police Raid Uncovers Massive Counterfeit SIM Card Operation
In response to a tip-off about suspicious activities occurring at a Sandton home, the South African Police Service (SAPS) took action. Upon receiving this information, members of the Gauteng Organised Crime Investigation Unit operationalised the intelligence as soon as…
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Truist Bank, one of the largest commercial banks in the United States, has confirmed a cybersecurity breach after stolen data appeared for sale on a hacking forum. The breach, which occurred in October 2023, was brought to light when…
Ransomware Attackers Are Weaponizing PHP Flaw to Infect Web Servers
Security researchers revealed that ransomware attackers have swiftly turned a simple-to-exploit PHP programming language vulnerability—which allows malicious code to be executed on web servers—into a weapon. As of Thursday last week, Censys’ Internet scans had found 1,000 servers infected…
The Indispensable Role of the CISO in Navigating Cybersecurity Regulations
With evolving cyber threats and stringent regulatory requirements, CISOs are tasked with ensuring the confidentiality, integrity, and availability of an organization’s digital systems and data. This article examines the regulatory landscape surrounding cybersecurity and explores effective strategies for CISOs…
Major Data Breach at CUHK Affects Over 20,000 Students and Staff
Over 20,000 individuals from the Chinese University of Hong Kong (CUHK) were impacted by a data breach at one of the institution’s schools in the city that resulted in their personal information being stolen. This is just the latest…
Phishing Attack Abuses Windows Search Protocol to Deploy Malware
A recently developed phishing campaign has emerged, leveraging the Windows Search protocol to deliver malicious scripts to unsuspecting users. This sophisticated attack uses HTML attachments to exploit the search-ms URI, pushing harmful batch files hosted on remote servers. The…
Identity Verification Becomes Crucial in the Digital Age
In the rapidly changing digital landscape, identity verification is emerging as a critical concern. As Web3 places increasing emphasis on data ownership and trust, authenticating one’s identity is becoming a major challenge. Recently, Roundtable anchor Rob Nelson and Ralf…
Protecting Your Business from Snowflake Platform Exploitation by UNC5537
A recent report from Mandiant, a subsidiary of Google Cloud, has uncovered a significant cyber threat involving the exploitation of the Snowflake platform. A financially motivated threat actor, identified as UNC5537, targeted around 165 organizations’ Snowflake customer instances, aiming…
Confidential NHS Patient Data Discovered in Jesmond Alleyway
The confidential medical information that is believed to have been held by a medical student in Jesmond was discovered among household waste last week in Jesmond. A letter sent by a patient’s doctor following an appointment, filled with sensitive…
Ascension Breached Due to Employee Downloading Malicious File
Ascension, one of the largest healthcare systems in the United States, disclosed that a ransomware attack in May 2024 was initiated when an employee mistakenly downloaded a malicious file onto a company device. The healthcare provider indicated that the…
Researchers Find ChatGPT’s Latest Bot Behaves Like Humans
A team led by Matthew Jackson, the William D. Eberle Professor of Economics in the Stanford School of Humanities and Sciences, used psychology and behavioural economics tools to characterise the personality and behaviour of ChatGPT’s popular AI-driven bots in…
The High Cost of Ransomware: Change Healthcare’s $22 Million Payout and Its Aftermath
A Costly Decision: The $22 Million Ransom When Change Healthcare paid $22 million in March to a ransomware gang that had devastated the company as well as hundreds of hospitals, medical practices, and pharmacies throughout the US, the cybersecurity industry…
New Malware Campaign Exploits Windows Search to Spread
A new and intricate alware campaign has been discovered by Trustwave SpiderLabs, leveraging the Windows search feature embedded in HTML code to spread malicious software. The attack begins with a phishing email containing an HTML attachment disguised as a…