Tag: EN

RansomHub Gang Breaches More Than 200 Organisations

FBI warns RansomHub ransomware gang growing quickly, with affiliates breaching at least 210 organisations since February This article has been indexed from Silicon UK Read the original article: RansomHub Gang Breaches More Than 200 Organisations

Scores of Organizations Hit By Novel Voldemort Malware

Proofpoint has uncovered a new cyber-espionage campaign deploying new malware dubbed “Voldemort” This article has been indexed from www.infosecurity-magazine.com Read the original article: Scores of Organizations Hit By Novel Voldemort Malware

X Shut Down In Brazil Amidst Supreme Court Spat

Social media platform X refuses to comply with Brazil court order to appoint legal representative, risking suspension in country This article has been indexed from Silicon UK Read the original article: X Shut Down In Brazil Amidst Supreme Court Spat

A new variant of Cicada ransomware targets VMware ESXi systems

A new ransomware-as-a-service (RaaS) operation called Cicada3301 has emerged in the threat landscape and already targeted tens of companies. Cicada3301 is a new ransomware-as-a-service (RaaS) operation that appeared in the threat landscape. The group appears to be very active and…

Trending Cybersecurity News Headlines on Google

Google to Revise One-Time Password (OTP) Process Google is set to introduce new rules for handling One-Time Passwords (OTPs) on Android devices. Starting soon, OTPs will be processed by Google’s spam filters with a delay of 20 seconds before reaching…

Essential Cybersecurity Tips for Travelers and Vacationers

Traveling can be an exciting and enriching experience, but it also exposes you to various cybersecurity risks. Whether you’re exploring new cities, relaxing on a beach, or attending a business conference, protecting your digital assets should be a priority. Here…

North Korean Threat Actor Exploits Chrome Zero-Day

A North Korean threat actor has been found exploiting a zero-day vulnerability in Chromium, now designated as CVE-2024-7971. The exploit, which enables remote code execution (RCE), is being attributed with high confidence to a North Korean group known as Citrine…

Keeping up with automated threats is becoming harder

98% of organizations attacked by bots in the past year lost revenue as a result, according to Kasada. Web scraping (web crawling) is a significant threat followed closely by account fraud, with more than one third of IT/IS specialists reporting…

Ransomware crisis deepens as attacks and payouts rise

During the second quarter, new ransomware groups, including PLAY, Medusa, RansomHub, INC Ransom, BlackSuit, and some additional lesser-known factions, led a series of attacks that eclipsed the first quarter of this year by 16% and the second quarter of 2023…

Damn Vulnerable UEFI: Simulate real-world firmware attacks

Damn Vulnerable UEFI (DVUEFI) is an open-source exploitation toolkit and learning platform for unveiling and fixing UEFI firmware vulnerabilities. Simulate real-world firmware attacks DVUEFI was created to assist ethical hackers, security researchers, and firmware enthusiasts in beginning their journey into…