When it comes to the cyber threat landscape, change is the only constant: the inevitable interplay between cybercriminals and law enforcement agencies makes it inevitable. Europol’s recently released Internet Organised Crime Threat Assessment (IOCTA) 2024 report covers events – law…
Tag: EN
Privilege escalation: unravelling a novel cyber-attack technique
Cyber criminals are notoriously relentless and unforgiving in their quest to exploit vulnerabilities through ever-evolving tactics. Organisations may believe that their security frameworks are robust, but when confronted with unprecedented attack methods, nobody is entirely immune to infiltration. Earlier this…
Enhancing the cybersecurity talent pool is key to securing our digital future
As the global digital industry continues to grow, there has been an increased demand for both businesses and Governments to prioritise cybersecurity. Cybercrime rates are quickly rising as according to Cybersecurity Ventures, damage costs are set to increase by 15%…
FrostyGoop Malware Used to Shut down Heat in Ukraine Attack
FrostyGoop can disrupt industrial processes by altering values on ICS devices. The malware exploited the Modbus protocol to directly affect industrial control systems, posing a significant threat to OT environments globally. This article has been indexed from Cyware News –…
Two Russian Nationals Charged for Cyber Attacks against U.S. Critical Infrastructure
The United States has designated Yuliya Vladimirovna Pankratova and Denis Olegovich Degtyarenko, two members of the Russian hacktivist group Cyber Army of Russia Reborn (CARR), for their roles in cyber operations targeting U.S. critical infrastructure. Pankratova, the group’s leader, and…
Law Enforcement Disrupts DDoS-for-Hire Service DigitalStress
Authorities in the UK infiltrated and disrupted the DDoS-for-hire service DigitalStress, and one suspect was arrested. The post Law Enforcement Disrupts DDoS-for-Hire Service DigitalStress appeared first on SecurityWeek. This article has been indexed from SecurityWeek RSS Feed Read the original…
Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in the country with malware known as HATVIBE and CHERRYSPY. The agency attributed the attack to a threat actor it tracks…
Meta Given Deadline to Address E.U. Concerns Over ‘Pay or Consent’ Model
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its “pay or consent” advertising model or risk-facing enforcement measures, including sanctions. The European Commission said the Consumer Protection Cooperation (CPC)…
Magento Sites Targeted with Sneaky Credit Card Skimmer via Swap Files
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest payment information. The sneaky technique, observed by Sucuri on a Magento e-commerce site’s checkout page, allowed the malware to survive…
How to Securely Onboard New Employees Without Sharing Temporary Passwords
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice of sharing temporary first-day passwords, which can expose organizations to security risks. Traditionally, IT departments have been cornered into either…
Everyone Has a Zero-Trust Plan Until They Get Punched in the Face
As a principle, zero trust can be taken for granted as a best practice. But the reality is that many aspects of IT infrastructure, from legacy systems to IoT, were […] The post Everyone Has a Zero-Trust Plan Until They…
Vulnerabilities in LangChain Gen AI
This article is a detailed study of CVE-2023-46229 and CVE-2023-44467, two vulnerabilities discovered by our researchers affecting generative AI framework LangChain. The post Vulnerabilities in LangChain Gen AI appeared first on Unit 42. This article has been indexed from Unit…
Hiring Kit: Security Architect
Developing and implementing both preventive security protocols and effective response plans is complicated and requires a security architect with a clear vision. This customizable hiring kit, written by Mark W. Kaelin for TechRepublic Premium, provides a framework you can use…
How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter
The code, the first of its kind, was used to sabotage a heating utility in Lviv at the coldest point in the year—what appears to be yet another innovation in Russia’s torment of Ukrainian civilians. This article has been indexed…
1-15 April 2024 Cyber Attacks Timeline
In the first timeline of April 2024 I collected 107 events (7.13 events/day), as always characterized by a majority of malware attacks. This article has been indexed from HACKMAGEDDON Read the original article: 1-15 April 2024 Cyber Attacks Timeline
Ransomware Takedowns Leave Criminals Scrambling for Stability
A recent report from Europol indicates that the disruption of ransomware-as-a-service (RaaS) groups is causing a fragmentation of the threat landscape, complicating tracking efforts. This article has been indexed from Cyware News – Latest Cyber News Read the original article:…
Cybersecurity News: CrowdStrike update, Russian criminals sanctioned, ransomware shuts down courts
CrowdStrike says “significant number” back up and running CrowdStrike reports that of the estimated 8.5 million Window’s devices impacted last Friday, “a significant number” are back in operation. In case […] The post Cybersecurity News: CrowdStrike update, Russian criminals sanctioned,…
Nvidia Said To Develop ‘Blackwell’ AI Chip For China
Nvidia said to be developing version of next-gen ‘Blackwell’ AI chip for China market as US mulls further export controls This article has been indexed from Silicon UK Read the original article: Nvidia Said To Develop ‘Blackwell’ AI Chip For…
Xiaomi Entered EV Market ‘Due To US Sanctions’
Xiaomi chief executive says he decided to begin making electric vehicles after company was placed on US military blacklist in 2021 This article has been indexed from Silicon UK Read the original article: Xiaomi Entered EV Market ‘Due To US…
Double-Digit Growth For Google Expected Amidst AI Push
Google expected to see double-digit revenue and profit growth for second quarter amidst AI cloud enthusiasm, stronger ad sales This article has been indexed from Silicon UK Read the original article: Double-Digit Growth For Google Expected Amidst AI Push