The nominations for the 4th annual Most Inspiring Women in Cyber Awards, sponsored by BT and hosted by Eskenzi PR, have opened. The event, to be held on the 27th February 2024 at the BT Tower in London, will honour…
Tag: EN
Government, Military Targeted as Widespread Exploitation of Ivanti Zero-Days Begins
The recently disclosed Ivanti VPN zero-days have been exploited to hack at least 1,700 devices, including government, telecoms, defense, and tech. The post Government, Military Targeted as Widespread Exploitation of Ivanti Zero-Days Begins appeared first on SecurityWeek. This article has…
US Export Controls Fuel Revenue Surge For Chip-Tool Maker Nuara
Chinese chip manufacturing equipment maker Nuara Technology sees spike in share price after reporting 50 percent revenue rise for 2023 This article has been indexed from Silicon UK Read the original article: US Export Controls Fuel Revenue Surge For Chip-Tool…
Why Therapists need Data Protection and Cybersecurity
Cybersecurity in Mental Healthcare – The Overlooked Risk Did you know the New-Age Therapeutic sector is unregulated? If that surprises you, then you’re not alone. I was a little surprised, too. Yes, there are various professional bodies a practitioner can…
Shining Light on Employee Cybersecurity Awareness in Retail
Individual users are often referred to as the weakest link in cybersecurity, as human error is a major contributor to security incidents of all kinds. However, employees can also be a significant asset when adequately trained in cybersecurity hygiene and…
Ivanti Zero-Days Exploited By Multiple Actors Globally
Volexity detects 1700 compromised Ivanti VPN devices following publication of two zero-days last week This article has been indexed from www.infosecurity-magazine.com Read the original article: Ivanti Zero-Days Exploited By Multiple Actors Globally
A lightweight method to detect potential iOS malware
Analyzing Shutdown.log file as a lightweight method to detect indicators of infection with sophisticated iOS malware such as Pegasus, Reign and Predator. This article has been indexed from Securelist Read the original article: A lightweight method to detect potential iOS…
Crypto Firm HashKey Attains Unicorn Status With $100m Funding Round
Hong Kong-based crypto firm HashKey Group attains valuation greater than $1bn after $100m funding round, in sign of digital asset optimism This article has been indexed from Silicon UK Read the original article: Crypto Firm HashKey Attains Unicorn Status With…
Hackers Abuse GitHub to Host Malicious Infrastructure
GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution (DDR), C2 (Command and Control) and exfiltration. T This is because GitHub is considered legitimate traffic, which threat actors can…
Inferno Drainer Spoofs Over 100 Crypto Brands to Steal $80m+
Group-IB report lifts the lid on infamous crypto-drainer malware Inferno Drainer This article has been indexed from www.infosecurity-magazine.com Read the original article: Inferno Drainer Spoofs Over 100 Crypto Brands to Steal $80m+
Integrating Zscaler ZIA with Sekoia.io
In September 2023, the Sekoia.io team embarked on a new intake development to integrate Zscaler ZIA logs into our SOC platform. After implementing Zscaler integration with a wide range of supported logs, events, and related built-in rules, our team shifted…
Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims
The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of one year between 2022 and 2023. The scheme “leveraged high-quality phishing pages to lure unsuspecting users into connecting their cryptocurrency wallets with the attackers’…
Russian Hackers Orchestrate Ukrainian Telecom Giant Attack
In a recent revelation by Ukraine’s top cyber official, Illia Vitiuk, it has been unveiled that the cyberattack on Kyivstar, Ukraine’s largest telecom operator, had its roots embedded months before the notorious December hack. The Ukrainian Telecom Giant attack, attributed…
Hackers Weaponize Windows Flaw to Deploy Crypto-Siphoning Phemedrone Stealer
Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer called Phemedrone Stealer. “Phemedrone targets web browsers and data from cryptocurrency wallets and messaging apps such as Telegram, Steam, and Discord,” Trend…
Mastermind Hacker Behind $2 Million Crypto Scam Arrested
The 29-year-old man was arrested in Mykolaiv, Ukraine, for using hacked accounts to create 1 million virtual servers to illegally mine cryptocurrency. It is estimated that the suspect has mined cryptocurrency worth over USD 2 million (or EUR 1.8 million). The…
Cyber Attack on Telecommunications Company
Isn’t it fascinating that the most expensive consequence of a cyber attack is information loss, which accounts for 43 percent of the overall costs incurred? The telecom sector, which includes the telephones, internet, cables, and aircraft, are the backbone of…
How does technology impact well-being? Cisco and OECD will launch a global study to find out.
Cisco announces a partnership with the OECD to study well-being in the digital age. Our joint initiative will examine the complex nature of digital transformation, its role as both a catalyst for progress and a source of potential risk to…
Experts warn of a vulnerability affecting Bosch BCC100 Thermostat
Researchers warn of high-severity vulnerability affecting Bosch BCC100 thermostats. Researchers from Bitdefender discovered a high-severity vulnerability affecting Bosch BCC100 thermostats. The researchers discovered a vulnerability, tracked as CVE-2023-49722 (CVSS score: 8.3), that can be exploited by an attacker on the…
Ransomware attacks witnessed 55% surge in 2023
The conclusion of the year 2023 witnessed an alarming 55% surge in ransomware attacks, as reported by Cyberint, a company specializing in threat intelligence services. In comparison to the preceding year’s 2034 victims, ransomware gangs targeted approximately 4356 victims in…
Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)
Cybersecurity researchers recently uncovered a critical flaw in the widely used Apache OFBiz Enterprise Resource Planning (ERP) system, CVE-2023-51467. The zero-day vulnerability CVE-2023-51467 poses a significant threat, boasting a CVSS. The post Critical Apache OFBiz Zero-day AuthBiz (CVE-2023-49070 and CVE-2023-51467)…