NHS England’s National Cyber Security Operations Centre (CSOC) has issued a high-severity cyber alert in response to the active exploitation of a critical vulnerability, CVE-2024-40711, in Veeam’s Backup & Replication software. This alert follows Veeam’s security bulletin from September, which…
Tag: Information Security Buzz
Check Point’s threat index emphasizes the shift towards AI-driven malware tactics in the current cyber landscape
Several interesting trends are emerging in the cybersecurity landscape, particularly the emergence of artificial intelligence (AI)-driven malware, as well as the ongoing dominance of ransomware threats. Threat actors have started using GenAI as part of their attack infrastructure, which illustrates…
OpenAI says bad actors are using ChatGPT to write malware, sway elections
Cybercriminals are increasingly exploiting OpenAI’s model, ChatGPT, to carry out a range of malicious activities, including malware development, misinformation campaigns, and spear-phishing. A new report revealed that since the beginning of 2024, OpenAI has disrupted over 20 deceptive operations worldwide,…
4 Frightening Things Coming for Security this Season
As we strive to “Secure Our World” this Cybersecurity Awareness Month, a few irrepressible haunts keep rearing their ugly heads. Here are some of the most malicious monsters hiding under our proverbial cybersecurity beds and what we need to know…
What is Digital Assurance and Why It’s Crucial in Today’s Business Landscape
Today’s businesses must navigate evolving technologies, customer expectations, and security threats. Digital assurance is emerging as a pillar of this transformation, ensuring that enterprises can mitigate risks, deliver reliable systems, and create long-term business value. Digital assurance is a key…
The “Mongolian Skimmer” Uses Unicode to Conceal Its Malicious Intent
Researchers at Jscrambler have uncovered a new skimming campaign dubbed the “Mongolian Skimmer.” This malware, initially detected through intelligence shared by Sansec, distinguishes itself through its use of unusual Unicode characters to obfuscate JavaScript code. Although at first glance, this…
31 Million Records Exposed Online by Sports Technology Company TrackMan
A whopping almost 32 million records and around 110 TB of data belonging to tech users from Trackman were left exposed to the internet. The database exposed user names, email addresses, device information, IP addresses, and security tokens. They were…
The Hidden Price of DevSecOps: How Security Tasks Are Sapping Developer Productivity and Jeopardizing Competitive Edge
Developers are spending significantly more time, and companies are spending 28K per developer each year on security-related tasks, such as manual application scan reviews, context switching, and secrets detection, among other things. This was revealed by JFrog, the Liquid Software company…
Palo Alto Networks Warns of Exploitable Firewall Hijack Vulnerabilities
Palo Alto Networks has issued an urgent advisory for its customers following the discovery of multiple critical vulnerabilities in its Expedition tool, which assists with firewall configuration migration. The vulnerabilities are as follows: CVE-2024-9463 has a score of 9.9. It’s…
No Silver Bullet, Just Smarter Security: More Expert Tips for Cyber Defense
We had such an overwhelming response to our first article, which shared industry expert opinions during Cybersecurity Awareness Month, that we’ll be publishing another few articles with more expert insights over the next few weeks. Following on with the theme…
Disinformation Campaign Targets Moldova Ahead of Presidential Elections and EU Membership Referendum
A cyber-enabled disinformation campaign, dubbed Operation MiddleFloor, is targeting Moldova’s government and educational sectors, according to Check Point Research. The campaign began in early August and appears to have been aimed at influencing the country’s presidential elections on 20 October,…
Password Basics: Why Mastering Fundamentals Is Crucial in Today’s Complex Cybersecurity Landscape
It’s often said, but worth repeating: In cybersecurity, we simply cannot afford to neglect the basics. Focus has increasingly shifted to the ‘scarier’ threats posed by Artificial Intelligence (AI) and other disruptive technologies, and many have been overlooking the basics…
Report Highlights Escalating Security Challenges Amid Swift AI Adoption
In the dynamic world of software development, security challenges are advancing at a rapid pace. Black Duck’s 2024 “Global State of DevSecOps” report examines the evolving trends and concerns in application security, drawing insights from a survey of over 1,000…
Lego Hacked by Crypto-Scammers
Early Saturday morning, Lego’s website briefly fell victim to a crypto scam that advertised a fake Lego coin token. The scam appeared as a banner on the homepage, positioned below an advertisement for Lego’s new Fortnite collaboration, which features building…
From Zero Trust to Full Trust: How Remote Browser Isolation Shields Against Emerging Threats
Cyber threats are ubiquitous and constantly evolving and companies are in dire need of robust defense mechanisms to protect their digital assets and ensure business continuity. Remote Browser Isolation (RBI) technology has emerged as a pivotal solution, offering a unique…
American Water Hit by Cyberattack
American Water, the largest publicly traded water and wastewater utility in the United States, has had to shut down certain systems following a cyberattack. The attack impacted the company’s online customer portal, MyWater, and paused billing services. In its 8-K…
Gorilla Botnet Launches Over 300,000 DDoS Attacks
A newly active botnet, dubbed “Gorilla Botnet,” has unleashed a gargantuan wave of cyberattacks this past September, according to the NSFOCUS Global Threat Hunting System. During a surge in activity from September 4 to September 27, Gorilla Botnet issued more…
VIPRE Introduces All-in-one Endpoint EDR+MDR Package for 24/7 Managed Security
VIPRE Security Group, a cybersecurity, privacy, and data protection company, has debuted a combined VIPRE Endpoint EDR+MDR package. This managed protection package provides organisations of all sizes with cost-effective, advanced, and around-the-clock endpoint security. For managed service providers (MSPs), this…
New DDoS Attack Vector Discovered in CUPS, Exposing 58,000+ Vulnerable Devices Online
Akamai researchers have identified a critical vulnerability in the Common Unix Printing System (CUPS) that could allow malicious actors to initiate powerful distributed denial-of-service (DDoS) attacks with minimal resources. Approximately 58,000 exposed devices are potentially at risk, posing a serious…
CloudSEK Debuts Free Deep Fake Detection Technology
CloudSEK, a provider of AI-driven cybersecurity solutions, has debuted Deep Fake Detection Technology, which is now available for free. The company says this initiative is part of its commitment to providing society with resources to combat cybercrime. Advanced Deep Fake…