A financial entity in Vietnam was the target of a previously undocumented threat actor called Lotus Bane that was first detected in March 2023. Singapore-headquartered Group-IB described the hacking outfit as an advanced persistent threat group that’s believed to have been active…
Tag: EN
Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and Stormous ransomware groups are jointly conducting double extortion ransomware attacks on various business verticals in multiple countries,” Cisco Talos researcher Chetan…
Project DDoSia – Russian Hackers Planning a Massive DDoS Attack
Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding targets with massive amounts of traffic to disable websites. Recently, the cybersecurity researchers at Sekoia identified that the Russian hacker…
From Prep to Pass, Scytale Launches Its Built-In Audit, Transforming It Into The Complete Compliance Hub for SaaS
Scytale’s built-in audit enables customers to track their audit progress, receive updates in real-time, and communicate with their auditor. The post From Prep to Pass, Scytale Launches Its Built-In Audit, Transforming It Into The Complete Compliance Hub for SaaS appeared…
Facebook and Instagram down by Cyber Attack
Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack might be to blame. Mark Zuckerberg, fresh from a vacation in India, promptly took to Twitter, now X, to assure…
Safeguarding Your Digital Reputation: Best Practices for Secure Data Erasure
In today’s interconnected world, maintaining a pristine digital reputation is paramount. Whether you’re an individual, a business, or an organization, the risk of cyber embarrassment stemming from leaked or improperly disposed of data looms large. From personal photos and sensitive…
Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla Web Shell
Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell. This malicious activity significantly threatens website security and data integrity, prompting concerns among cybersecurity experts and website administrators worldwide. Cybercriminals…
5 ways to keep API integrations secure
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment card data. Keeping this data safe from attackers—while ensuring that the integrations perform at the desired level—requires adopting several security…
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
Apple has released security updates to address several security flaws, including two vulnerabilities that it said have been actively exploited in the wild. The shortcomings are listed below – CVE-2024-23225 – A memory corruption issue in Kernel that an attacker with…
Navigating regulation challenges for protecting sensitive healthcare data
In this Help Net Security video, Chris Bowen, CISO at ClearDATA, emphasizes the importance of digital health companies being more transparent with their users. As more and more Americans flock to direct-to-consumer digital health apps and resources, most people don’t…
RiskInDroid: Open-source risk analysis of Android apps
RiskInDroid (Risk Index for Android) is an open-source tool for quantitative risk analysis of Android applications based on machine learning techniques. How RiskInDroid works “A user should be able to quickly assess an application’s level of risk by simply glancing…
AI Auctions: Collectibles, Taylor Swift, Jordan Bots
Discover the fascinating world of AI, ML, and RPA and their real-world applications including the creation of a custom RPA bot for collecting rare sports memorabilia. This article has been indexed from Trend Micro Research, News and Perspectives Read the…
Self-Replicating AI Malware is Here😱 #ComPromptMized
Skrik: Researchers worm themselves into your nightmares. The post Self-Replicating AI Malware is Here😱 #ComPromptMized appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Self-Replicating AI Malware is Here😱 #ComPromptMized
Threat Spotlight: Data Extortion Ransomware Threats
Over the last few years, the ransomware landscape has changed significantly. Between 2022 and 2023, ransomware attacks increased by more than 100% year-over-year, with more attacks consisting of double and triple extortion. At a high level, the categories of ransomware…
Self-Replicating AI Malware is Here😱 #ComPromptMized
Skrik: Researchers worm themselves into your nightmares. The post Self-Replicating AI Malware is Here😱 #ComPromptMized appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Self-Replicating AI Malware is Here😱 #ComPromptMized
How to create an efficient governance control program
Your success as an organization, especially in the cyber realm, depends on your security posture. To account for the ongoing evolution of digital threats, you need to implement robust governance control programs that address the current control environment and help…
Home Network Guest Wi-Fi: Best Practices
Need to set up a secure and reliable guest Wi-Fi network for your home? Discover the best practices to protect your personal information and provide seamless connectivity for your guests. The post Home Network Guest Wi-Fi: Best Practices appeared first…
Self-Replicating AI Malware is Here😱 #ComPromptMized
Skrik: Researchers worm themselves into your nightmares. The post Self-Replicating AI Malware is Here😱 #ComPromptMized appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read the original article: Self-Replicating AI Malware is Here😱 #ComPromptMized
AI tools put companies at risk of data exfiltration
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the issue, indicating swift action is needed, according to Code42. Since 2021, there has been a…
Japan orders local giants LINE and NAVER to disentangle their tech stacks
Government mighty displeased about a shared Active Directory that led to a big data leak Japan’s government has ordered local tech giants LINE and NAVER to disentangle their tech stacks, after a data breach saw over 510,000 users’ data exposed.……