Tag: Information Security Buzz

The EU AI Act: A Critical Overview of a Necessary Act?

The EU AI Act represents a crucial step towards responsible AI development, deployment, and use of AI in the European Union. However, Lamprini Gyftokosta, Director of Artificial Intelligence and Human Rights at Homo Digitalis, raises serious questions about its effectiveness…

AppSOC Research Labs Delivers Damning Verdict on DeepSeek-R1

Silicon Valley security provider AppSOC has branded DeepSeek-R1, one of the latest highly advanced artificial intelligence (AI) models to emerge from China, a “high-risk model unsuitable for enterprise use.” They strongly recommend that enterprises not use the DeepSeek-R1 model provided on…

Oracle’s Data Breach Denial Unravels as Leaked Info Checks Out

Despite Oracle’s denial of a breach affecting its Oracle Cloud federated SSO login servers, Bleeping Computer has confirmed with multiple companies that data samples shared by the threat actor are authentic.  Recently, a threat actor, “rose87168,” claimed to be selling…

IngressNightmare: Critical Kubernetes Flaws Put 6,500+ Clusters at Risk

Five critical security vulnerabilities have been found in the Ingress NGINX Controller for Kubernetes, potentially enabling unauthenticated remote code execution. This exposure puts over 6,500 clusters at immediate risk by making the component accessible via the public internet.  The vulnerabilities,…

Critical Flaws in Appsmith Exposed Systems to Full Takeover

Rhino Security researchers have identified multiple critical vulnerabilities in Appsmith, an open-source developer platform commonly used for building internal applications. The most severe of these is CVE-2024-55963, which enables unauthenticated attackers to execute arbitrary system commands on servers running default…

The Cost of Delay: Privacy Risks from Post-Quantum Cryptography Inaction

The cybersecurity landscape is facing a critical turning point as quantum computing (QC) rapidly advances. Delaying the implementation of post-quantum cryptography (PQC) solutions could have devastating consequences for data privacy.   Traditional encryption methods, including RSA and ECC, are on the…

The API Security Illusion: IT Leaders May Be Overconfident

As APIs become more integral to both everyday digital services and complex AI systems, concerns over their security are growing — and not without good reason. APIs are the connective tissue of modern software, but without strong governance, they can…

DeepSeek Can Be Abused to Create Malware

In a recent investigation, Tenable researchers explored how DeepSeek, a large language model (LLM) built by a Chinese company, can be exploited to generate malware, including keyloggers and ransomware, despite its initial refusal to engage in harmful activities.  Unlike popular…

OpenAI Pushes for Federal-Only AI Regulation

OpenAI has officially called on US lawmakers to exempt it from complying with state-level AI regulations, instead urging a unified approach under federal AI rules. It argues that a consistent, nationwide framework is critical to maintain US leadership in AI…

Google Uncovers China-Linked Espionage Campaign Targeting Juniper Routers

Google’s Threat Analysis Group (TAG) and Mandiant have uncovered a sophisticated espionage campaign linked to China-nexus threat actors, targeting vulnerable Juniper routers used in enterprise and government networks worldwide. This discovery highlights the ongoing risks posed by state-sponsored attacks against…

Gloomy News from Kansas as Sunflower Medical Group Disclose Data Breach

Kansas-based Sunflower Medical Group disclosed to authorities on 7th March that they had suffered a data breach compromising the personal and confidential information of 220,968 individuals.  In a statement on their website entitled ‘Notice of a Data Security Incident,’ Sunflower provided…

Confidence Gap in Cybersecurity Leaves Businesses at Risk

New research has revealed that although 86% of employees believe they can confidently identify phishing emails, nearly half have fallen for scams.   The study, conducted by KnowBe4, surveyed professionals in the UK, USA, Germany, France, Netherlands, and South Africa and…

New Bill Aims to Strengthen Cybersecurity for Federal Contractors

The House of Representatives has passed a bill that mandates contractors working with the federal government implement vulnerability disclosure policies (VDPs) in alignment with NIST guidelines.    The Federal Contractor Cybersecurity Vulnerability Reduction Act of 2025, introduced by Chairwoman Nancy Mace…

Gone in 120 Seconds: TRUMP Coin Phishing Lure Delivers RAT

A phishing email pretending to be from Binance, offering people the chance to claim newly created TRUMP coins, has turned out to be a phishing lure.   Cofense is warning that if victims follow the email’s instructions and download what is…

Deepfake CEO Video Rocks YouTube

YouTube was forced to release a statement last week warning users that fraudulent artificial intelligence (AI)- generated videos depicting their CEO Neal Mohan announcing changes in monetization were in circulation. The deepfake videos were sent out as private videos to…

Is Cybersecurity Complexity Making Us All Insecure?

As the goal posts of what it means to be (and remain) ‘cyber secure’ constantly change, one thing stays constant: all organizations are viable targets for cybercriminals. It doesn’t matter whether you’re a large enterprise business, startup, or a government…

Global Crackdown Slashes Cobalt Strike Availability by 80%

A global effort led by Fortra, Microsoft’s Digital Crimes Unit (DCU), and the Health Information Sharing and Analysis Center (ISAC) has reduced access to weaponized versions of the powerful hacking tool Cobalt Strike by 80%.  Dramatic Reduction in Dwell Time …

How Can Your Smart Washer Pose a Threat to Your Privacy?

Did you know that your smart washing machine could be hacked, leading to the theft of your data?  It’s surprising, but this viral story on Twitter will make you rethink smart technology. Smart washing machines are known to consume no…

EDR and Vendor Consolidation are a Losing Approach to Cybersecurity

Since 2020, the push for consolidating cybersecurity solutions has gained significant momentum. In 2021, Gartner highlighted vendor consolidation as one of the top security and risk trends. Their article, The Top 8 Security and Risk Trends We’re Watching, revealed that 75%…

Leeds United Supporters Suffer Cyber Attack

Following the conclusion of some of their matches this season, as with any other season, the sentiment among Leeds United football supporters that they have “been robbed” can be heard reverberating around the ground, on the terraces, and in the…

Broadcom Warns VMware Users of Critical Zero-Day Exploits

Broadcom has issued a security alert warning VMware customers about three zero-day vulnerabilities attackers are actively exploiting in the wild. The flaws – CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 – impact VMware ESX products, including VMware ESXi, vSphere, Workstation, Fusion, Cloud Foundation,…

Silk Typhoon Targets IT Supply Chain in Evolving Cyber Campaign

Microsoft Threat Intelligence has warned of a shift in tactics by Silk Typhoon, a Chinese espionage group that is now exploiting vulnerabilities in common IT solutions—including remote management tools and cloud applications—to gain initial access to target entities.   The software…

Expert Q&A: How To Safely Turn AI Into Your Security Ally

Admins are in a tough position right now. Enterprise ecosystems are expanding, role responsibilities are growing, and hackers are getting smarter. Rather than viewing AI as another potential vulnerability, Hexnode CEO Apu Pavithran argues that admins must embrace it as…

Google Issues Urgent Alert for Exploited Android Vulnerabilities

Google has issued an urgent security alert addressing two critical Android vulnerabilities, CVE-2024-43093 and CVE-2024-50302, which are actively being exploited in coordinated attacks targeting devices running Android versions 12 through 15.   The vulnerabilities, patched in the March 2025 Android Security…

Highly Targeted Cyber Espionage Campaign Targeting UAE Aviation Sector

A new cyber espionage campaign has been uncovered targeting a select group of entities in the United Arab Emirates (UAE), focusing on aviation, satellite communications, and critical transportation infrastructure.   The attack, identified by Proofpoint researchers, used advanced obfuscation techniques and…

Key Takeaways from the SEON 2025 Digital Fraud Outlook

AI-driven automation and real-time transaction monitoring are the top priorities for organizations seeking to combat fraud, the 2025 Digital Fraud Outlook report published by SEON has revealed. Fraud Budgets Grow, But ROI is Complicated According to the report, 85% of…

Attackers Target Over 4000 IP Addresses of US, China ISPs

The Splunk Threat Research Team has uncovered a widespread cyber campaign targeting Internet Service Provider (ISP) infrastructure providers on the West Coast of the United States and in China. Over 4,000 ISP-related IPs were explicitly targeted in this campaign.  The…

JFrog Becomes an AI System of Record, Debuts JFrog ML

JFrog a liquid software company and creators of the JFrog Software Supply Chain Platform, has debuted  JFrog ML, a MLOps solution as part of the JFrog Platform designed to enable development teams, data scientists and ML engineers to quickly develop…

VulnCheck Exposes CVEs from Black Bastas’ Chats

Cybersecurity researchers at VulnCheck have exposed internal conversations between members of the Black Basta ransomware group, revealing rare insights into the groups’ tactics and actionable advice for cybersecurity defenders. The key takeaway? Black Basta generally prioritizes known weaknesses.   Extensive Use…

US Pauses Offensive Cyber-Ops Against Russia

Defense Secretary Pete Hegseth has ordered U.S. Cyber Command to halt all planning against Russia, including offensive digital operations, The Record reports.  The directive, issued towards the end of last week to Cyber Command chief General Timothy Haugh, heralds a…

Open Source Security Risks Continue to Rise

Eighty-six percent of commercial codebases contain vulnerabilities, with 81% harboring high-or-critical-risk vulnerabilities, new research from Black Duck has revealed.   The 2025 Open Source Security and Risk Analysis (OSSRA) report drives home the massive risk posed by outdated and unmonitored open-source…

Qilin Claims Lee Enterprises Ransomware Attack

Notorious ransomware gang Qilin has claimed responsibility for the 3 February attack on Lee Enterprises, an American media company.  On its data leak site, Qilin claimed to have stolen 350 GB of data, including “investor records, financial arrangements that raise…

Cleveland Municipal Court Remains Closed After Cyber Event

The Cleveland Municipal Court, including Cleveland Housing Court, will remain closed today, one week after it was hit by a cyber event.  On its Facebook page on 24 February, it said it is currently investigating a cyber incident. Although it…

Massive Cyberattack Exploits Legacy Windows Driver to Evade Detection

Check Point Research (CPR) has uncovered a sophisticated cyber campaign leveraging a vulnerable Windows driver to disable security protections, evade detection, and deploy malicious payloads.  They identified a large-scale, ongoing attack campaign that abuses a legacy version of the Truesight.sys…

The First International AI Safety Report: A Call to Action

The inaugural International AI Safety Report provides a comprehensive insight into General-purpose AI’s current state, future potential, and associated risks. General-purpose AI refers to AI models or systems that can perform a wide variety of tasks, as opposed to Specialized…

Windows CE and ICS Security: A Ticking Time Bomb?

Windows CE, a decades-old operating system originally designed for embedded systems, remains a crucial component of industrial control systems (ICS) and supervisory control and data acquisition (SCADA) environments.  However, despite its widespread use in human-machine interfaces (HMI), kiosks, and even…

Expert Feature: Securing Passwords and Endpoints in the Age of AI

At a time when artificial intelligence (AI) is reshaping cybersecurity, conventional approaches to passwords and endpoint management are increasingly vulnerable. AI-powered threats are rapidly evolving, leveraging automation and deep learning to crack passwords, slip past authentication measures, and exploit weaknesses…

Trump’s Reckless NIST Purge Puts US Semiconductors, AI Safety at Risk

The Trump administration is set to significantly weaken the CHIPS Act by terminating hundreds of employees at the National Institute of Standards and Technology (NIST), the agency responsible for administering the semiconductor incentive program.    President Biden signed the bipartisan CHIPS…

Ghostwriter Campaign Targets Ukrainian Government and Belarusian Opposition

Cybersecurity researchers at SentinelLABS have uncovered a new campaign linked to the long-running Ghostwriter operation, targeting Belarusian opposition activists and Ukrainian military and government entities.   The campaign, which entered its active phase in late 2024, is ongoing, with recent malware…

CISA, FBI, and MS-ISAC Warn of Ghost Ransomware Threat

The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has issued a joint Cybersecurity Advisory on Ghost (Cring) ransomware.   The advisory, titled #StopRansomware: Ghost…

Massive Botnet Targets MS 365 Accounts with Password Spraying Attacks

A botnet made up of more than 130,000 compromised devices is conducting large-scale password-spraying attacks against M365 accounts, exploiting non-interactive sign-ins with Basic Authentication.   This method lets malicious actors bypass modern login protections, evade multi-factor authentication (MFA) enforcement, and remain…

Cisco Confirms Salt Typhoon Exploitation in Telecom Hits

Cisco Talos has been actively tracking reports of extensive intrusion attempts targeting multiple major U.S. telecommunications companies. First identified in late 2024 and subsequently confirmed by the US government, this activity is attributed to a highly advanced threat actor known…

Cybercrooks Exploit URL Manipulation in Sophisticated Phishing Scam

In a newly seen phishing campaign, malicious actors have exploited URL manipulation techniques to obfuscate their malicious links, compromising businesses and individuals worldwide.   Check Point researchers identified a whopping 200,000 phishing emails abusing URL information to hide phishing links, with…

The Bourne Insecurity: When Defense Employees Unwittingly Help Attackers

A recent analysis by cybersecurity firm Hudson Rock on its Infostealers site has uncovered alarming vulnerabilities within the US military and its defense contractors due to widespread info stealer malware infections.   According to the company, these infections have compromised sensitive…

Mustang Panda APT Exploits Windows Utilities to Slip Through Security Nets

Researchers from Trend Micro’s Threat Hunting team have uncovered a new technique employed by the advanced persistent threat (APT) group dubbed Mustang Panda or Earth Preta.   The cyberespionage group has been abusing the Microsoft Application Virtualization Injector (MAVInject.exe) to stealthily…

Qualys Identifies Critical Vulnerabilities that Enable DDoS, MITM Attacks

The Qualys Threat Research Unit (TRU) has uncovered two significant vulnerabilities in OpenSSH, a widely used open-source implementation of the Secure Shell (SSH) protocol.   These flaws, tracked as CVE-2025-26465 and CVE-2025-26466, pose substantial security risks to enterprise infrastructure and encrypted…

2025 ZeroFox Forecast: Dark Web, Ransomware, Gen AI & Beyond

Various threat actors and organizations are expected to undergo significant changes. Deep and Dark Web (DDW) marketplaces will likely be influenced and governed by law enforcement operations and geopolitical factors, while ransomware, digital extortion, and social engineering will continue to…

South Korea Temporarily Suspends DeepSeek Over Data Privacy Worries

South Korea has formally suspended new downloads of the Chinese AI chatbot DeepSeek, citing concerns over data privacy and compliance with domestic regulations. The suspension took effect on 15  February, according to the Personal Information Protection Commission (PIPC).   While downloads…

The Biggest Cybersecurity Threats to Watch Out For in 2025

In the last year, we’ve seen threats become more elaborate and tactical as they leverage the latest technologies. In 2024, data breaches reached the second highest level on record, with 3,158 compromises on the year exposing the data of more…

Microsoft Uncovers Enhanced macOS Malware Targeting Xcode Projects

Microsoft Threat Intelligence has uncovered a new variant of XCSSET, a sophisticated modular macOS malware that targets users by infecting Xcode projects. While the latest variant has only been observed in limited attacks, security researchers warn that its enhanced capabilities…

Massive Data Exposure at Mars Hydro Highlights IoT Security Risks

Jeremiah Fowler, an experienced cybersecurity researcher at vpnMentor and co-founder of Security Discovery, has uncovered a massive data exposure involving nearly 2.7 billion records linked to Mars Hydro, a China-based manufacturer of IoT-enabled grow lights.   The breach, which included sensitive…

How to Rebuild and Restore SQL Server Master Database

In MS SQL Server, master database is the primary database that stores system information. This includes login details, linked servers, endpoints, system configurations, existence of other databases, etc. If the master database gets corrupted or damaged, the SQL Server service…

eSentire Uncovers EarthKapre/RedCurl Attack Targeting Law Firms

eSentire’s Threat Response Unit (TRU) has uncovered a new cyber espionage campaign leveraging a legitimate Adobe executable to sideload the EarthKapre/RedCurl loader. The attack specifically targeted a firm in the Legal Services industry, highlighting the group’s persistent focus on corporate…

Espionage Tools Associated with China Used in Ransomware Attacks

Espionage actors linked to China may be diversifying their operations, as new evidence points to the use of espionage tools in a recent ransomware attack against a South Asian software and services company.   Symantec Threat Intelligence reports that the attack,…

The Inside Man: Security Training on a Grand Scale

The Inside Man is security training like no other. Now in its sixth season, KnowBe4’s Netflix-style security awareness video series boasts a compelling storyline, memorable characters, and, most noticeably, a budget other training providers could only dream of. But does…

From Sweethearts to Swindlers: Valentine’s Day Fraud Surges

As people celebrate Valentine’s Day today, malicious actors are jumping on the love bandwagon in an opportunity to exploit heightened emotions and consumer spending with a wave of scam emails.  According to the latest findings from Bitdefender Antispam Lab, a…

The Art of Teaching Cybersecurity Through Storytelling

Storytelling is one of the most ancient and effective forms of human teaching. Just like prehistoric tales warned of the perils lurking in the wild, modern narratives can teach people about the perils lurking in cyberspace. We recently sat down…

How CIOs can lead the charge on AI, data, and business innovation

The growing momentum behind business innovation, particularly in the realm of AI and data, is increasingly driving how businesses operate, invest, and deliver value. Whilst this may not appear different from previous years, the proliferation of new technologies and tools…

CISA, FBI Warn of Threats Exploiting Buffer Overflow Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a new Secure by Design Alert warning about the risks posed by buffer overflow vulnerabilities in software.   The alert, titled “Eliminating Buffer Overflow Vulnerabilities,”…

DeepSeek-R1: A Smorgasbord of Security Risks

In the short time since its debut, DeepSeek has made waves in the AI industry, garnering praise as well as scrutiny. The model’s meteoric rise has fueled debate over its claimed efficiency, intellectual property worries, and its general reliability and…