MuddyWater, an Iranian threat actor, has used a novel command-and-control (C2) infrastructure known as DarkBeatC2 in its the most recent attack. This tool joins a list of previously used systems, including SimpleHarm, MuddyC3, PhonyC2, and MuddyC2Go. In a recent…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Is Facial Biometrics the Future of Digital Security?
Within the dynamic sphere of digital technology, businesses are continually seeking innovative solutions to streamline operations and step up their security measures. One such innovation that has garnered widespread attention is facial biometrics, a cutting-edge technology encompassing face recognition…
The Silent Flaw: How a 6-Year-Old BMC Vulnerability Went Unnoticed
A six-year-old vulnerability has recently come to light, affecting Intel and Lenovo servers. Let’s delve into the details of this silent flaw and its implications. About vulnerability The vulnerability resides within the Lighttpd web server, a lightweight and efficient open-source…
300 Strikes: Fort Worth’s Battle Against the Medusa Gang
In the wake of a cyberattack on Tarrant County Appraisal District in March, the Medusa ransomware gang has claimed responsibility for the hack and has threatened the public with the threat of leaking 218 GB of the stolen data…
Offensive Security Necessitates a Data-driven Approach for CISOs
There remains a significant disparity in utilisation of resources between defensive and offensive cybersecurity technologies. When comparing the return on investment (ROI) for defensive and offensive investments, security experts discovered that offensive security routinely outperforms defensive security. For example,…
Unmasking the “Golden Top” Cybercrime Syndicate: Zambia’s Battle Against Deception
Zambia has exposed a sophisticated Chinese cybercrime syndicate that preyed on unsuspecting victims across the globe. The operation, which unfolded during a multi-agency raid, led to the apprehension of 77 individuals, including 22 Chinese nationals. This case sheds light on…
AI’s Role in Averting Future Power Outages
Amidst an ever-growing demand for electricity, artificial intelligence (AI) is stepping in to mitigate power disruptions. Aseef Raihan vividly recalls a chilling night in February 2021 in San Antonio, Texas, during winter storm Uri. As temperatures plunged to -19°C,…
X’s URL Blunder Sparks Security Concerns
X, the social media platform formerly known as Twitter, recently grappled with a significant security flaw within its iOS app. The issue involved an automatic alteration of Twitter.com links to X.com links within Xeets, causing widespread concern among users.…
E-Challan Fraud, Man Loses Rs 50,000 Despite Not Sharing Bank OTP
In a cautionary tale from Thane, a 41-year-old man, M.R. Bhosale, found himself embroiled in a sophisticated online scam after his father fell victim to a deceptive text message. The incident sheds light on the dangers of trusting unknown…
Cybercriminals Employ Obfuscation in Invoice Phishing Malware Campaigns
An array of cunning cyberattack campaigns utilizing seemingly innocuous invoices to deliver malware attacks have been uncovered by cybersecurity researchers. In this deceptive campaign, malicious Scalable Vector Graphics (SVG) file attachments are embedded in phishing emails that have been…
Windows Systems Vulnerable to Attacks Due to Critical ‘BatBadBut’ Rust Flaw
A significant security loophole within the Rust standard library has emerged, posing a threat specifically to Windows users by enabling potential command injection attacks. Designated as CVE-2024-24576 and carrying a maximum severity score of 10.0 according to the Common…
Secrets of SharePoint Security: New Techniques to Evade Detection
According to a recent discovery by Varonis Threat Labs, two new techniques have emerged that pose a significant threat to data security within SharePoint, a widely used platform for file management. These techniques enable users to evade detection and…
The Future of Quantum Computers: Challenging Space Encryption with Light
In the realm of technology and communications, the race for supremacy between quantum computers and space encryption is intensifying. While quantum computers hold the promise of unprecedented processing power, space encryption, leveraging light to beam data around, presents a…
AI Could Be As Impactful as Electricity, Predicts Jamie Dimon
Jamie Dimon might be concerned about the economy, but he’s optimistic regarding artificial intelligence. In his annual shareholder letter, JP Morgan Chase’s (JPM) CEO stated that he believes the effects of AI on business, society, and the economy would…
The Vulture in Cyberspace: A Threat to Your Finances
In the digital landscape where information flows freely and transactions occur at the speed of light, a new predator has emerged. Aptly named the “Vulture,” this cyber threat silently circles its unsuspecting prey, waiting for the right moment to strike.…
AI Integration in Cybersecurity Challenges
In the ongoing battle against cyber threats, government and corporate heads are increasingly turning to artificial intelligence (AI) and machine learning (ML) for a stronger defense. However, the companies are facing a trio of significant hurdles. Firstly, the reliance…
Threatening Emails Rattle Bengal Schools: Police Pursue Latvia Lead
In a statement announced Tuesday, the Kolkata Police said that more than 20 schools across the city have been threatened with bombs, which have been later revealed as hoaxes. According to the sender, bombs had been placed in numerous…
Look Out For SIM Swap Scams: Tips for Bitcoin Security
In today’s digitised world, safeguarding personal information and digital assets is of great importance. One emerging threat is the SIM swap scam, a sophisticated form of identity theft where fraudsters manipulate mobile carriers to transfer a victim’s phone number…
91,000 Smart LG TV Devices Susceptible to Unauthorised Remote Access
New vulnerabilities have been discovered in LG TVs that could allow unauthorised access to the devices’ root systems, possibly exposing thousands of units worldwide. The finding, made as part of Bitdefender’s continuing inspection of the popular Internet of Things…
Under Siege: Ukrainian Cyber Warriors Erase Vital Russian Military Data Center
On April 8 of this year, sources in the Ukrainian Security Service of Ukraine (SBU) told the Kyiv Independent that Ukrainian hackers, possibly linked to the SBU, destroyed a data centre used by Russian military, energy, and telecommunications companies.…