A malware framework named DarkCracks has been identified by cybersecurity experts from QiAnXin. This newly discovered threat takes advantage of weaknesses in GLPI, an IT asset management system, and WordPress websites. DarkCracks has raised alarm due to its ability…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Cybercriminals Ramp Up Malvertising Schemes Through Google Searches
Malvertising, the practice of using online ads for malicious purposes, is on the rise, with incidents in the U.S. spiking by 42 per cent in fall 2023, according to cybersecurity firm Malwarebytes. Hackers are leveraging increasingly sophisticated techniques to…
Adlumin Thwarts Fog Ransomware Attack Using Innovative Decoy Technology
In early August 2024, cybercriminals launched a ransomware attack on a mid-sized financial firm using compromised VPN credentials, deploying the “Fog” ransomware variant on both Windows and Linux endpoints. However, Adlumin’s cutting-edge technology successfully stopped the attack by employing…
Continuous Threat Exposure Management: A Proactive Cybersecurity Approach
Continuous Threat Exposure Management (CTEM) represents a significant shift in cybersecurity strategy, moving beyond the limitations of traditional vulnerability management. In an era where data breaches and ransomware attacks remain prevalent despite substantial cybersecurity investments, CTEM offers a comprehensive…
CyberVolk Ransomware: A Rising Threat to Global Cybersecurity
The Indian hacker outfit CyberVolk, which is a relatively new player in the cybercrime arena, has made headlines with its sophisticated ransomware. CyberVolk Ransomware, discovered in July 2024, has quickly gained attention for its sophisticated features and quick progress. …
The Slim CD Data Breach: 1.7 Million Credit Cards Compromised
Credit card security has always been a challenge for users, as hackers try innovative ways to lure the victims. In a massive data breach, payment gateway provider Slim CD (it offers payment processing services for both online and offline merchants)…
CISA Identifies Industrial Cybersecurity Bugs in Baxter and Mitsubishi Products
A report published recently by the Cybersecurity and Infrastructure Security Agency (CISA) warned about two new ICS vulnerabilities found in products widely used in healthcare, critical manufacturing, and other sectors susceptible to cybercrime activity. Among the affected products are…
Google’s Grip on Ad Tech: What the UK Competition Watchdog Discovered
The UK Competition and Markets Authority (CMA) has provisionally found that Google has been abusing its dominant position in the online advertising technology market. This finding could have far-reaching implications for the digital advertising ecosystem, affecting thousands of publishers and…
Council of Europe Lunches First AI Treaty
The Council of Europe has launched the first legally binding international treaty on artificial intelligence (AI) to align AI usage with the principles of human rights, democracy, and the rule of law. Known as the Framework Convention on Artificial Intelligence,…
TFL Hit by Cyberattack, Leaving Disabled Riders Stranded
Transport for London (TfL) recently confirmed that disabled passengers are the first group to feel the effects of a cyberattack that has hit their systems. This incident has severely impacted the Dial-a-Ride service, a specialised transport service designed for…
Novel Android Malware Employs OCR to Steal Crypto Wallet Keys From Images
A novel mobile malware operation dubbed SpyAgent has surfaced targeting Android device users in South Korea. According to an investigation by McAfee Labs researcher SangRyol Ryu, the malware “targets mnemonic keys by scanning for images on your device that…
Protecting Against Fog Ransomware: Key Strategies and Insights
In August 2024, a mid-sized financial firm was targeted by a ransomware attack using compromised VPN credentials to deploy a variant called “Fog” on both Windows and Linux systems. Fortunately, the attack was detected and neutralized by Adlumin’s innovative…
Apache Addresses Severe RCE Vulnerability in OFBiz with an Urgent Patch
In a recent release, the Apache OFBiz project developers have been working on a patch to fix a new critical flaw of software that can be exploited by unauthenticated attackers to execute arbitrary code on the server. Considering that…
83% of Businesses Hit by Ransomware – Are You Next?
Ransomware continues to be a critical threat to businesses worldwide, with a staggering 83% of organisations reporting they experienced at least one ransomware attack in the last year. Alarmingly, almost half of those affected (46%) faced four or more…
Cyberattack Targets Malaysian Officials with Babylon RAT Malware
An investigation by the Cyble Research and Intelligence Lab (CRIL) has uncovered a sophisticated cyberattack aimed at Malaysian political figures and government officials. Initiated in July 2024, the attack utilizes fake ISO files to deploy Babylon RAT, a dangerous malware…
Here’s Why Attackers Have a Upper Hand Against CISOs
Security experts have an in-depth knowledge of the technical tactics, techniques, and procedures (TTPs) that attackers employ to launch cyberattacks. They are also knowledgeable about critical defensive methods, such as prioritising patching based on risk and creating a zero-trust…
Australia’s Proposed Mandatory Guardrails for AI: A Step Towards Responsible Innovation
Australia has proposed a set of 10 mandatory guardrails aimed at ensuring the safe and responsible use of AI, particularly in high-risk settings. This initiative is a significant step towards balancing innovation with ethical considerations and public safety. The Need…
22,000 PyPI Packages Affected by Revival Hijack Supply-Chain Attack
It has been discovered that hackers can distribute malicious payloads easily and efficiently through the package repository on the PyPI website by using a simple and troublesome exploit. A JFrog security researcher has discovered a new supply chain attack…
Cyber Resilience: Preparing for the Inevitable in a New Era of Cybersecurity
At the TED Conference in Vancouver this year, the Radical Innovators foundation brought together over 60 of the world’s leading CHROs, CIOs, and founders to discuss how emerging technologies like AI and quantum computing can enhance our lives. Despite…
Surge in Ransomware Groups Amid Law Enforcement Disruptions in 2024
New research from Searchlight Cyber reveals a significant rise in ransomware groups, with 73 active groups identified in the first half of 2024, compared to 46 during the same period in 2023. These findings suggest that while law enforcement…