American Water, the largest publicly traded water and wastewater utility in the United States, has had to shut down certain systems following a cyberattack. The attack impacted the company’s online customer portal, MyWater, and paused billing services. In its 8-K…
Tag: Information Security Buzz
Gorilla Botnet Launches Over 300,000 DDoS Attacks
A newly active botnet, dubbed “Gorilla Botnet,” has unleashed a gargantuan wave of cyberattacks this past September, according to the NSFOCUS Global Threat Hunting System. During a surge in activity from September 4 to September 27, Gorilla Botnet issued more…
VIPRE Introduces All-in-one Endpoint EDR+MDR Package for 24/7 Managed Security
VIPRE Security Group, a cybersecurity, privacy, and data protection company, has debuted a combined VIPRE Endpoint EDR+MDR package. This managed protection package provides organisations of all sizes with cost-effective, advanced, and around-the-clock endpoint security. For managed service providers (MSPs), this…
New DDoS Attack Vector Discovered in CUPS, Exposing 58,000+ Vulnerable Devices Online
Akamai researchers have identified a critical vulnerability in the Common Unix Printing System (CUPS) that could allow malicious actors to initiate powerful distributed denial-of-service (DDoS) attacks with minimal resources. Approximately 58,000 exposed devices are potentially at risk, posing a serious…
CloudSEK Debuts Free Deep Fake Detection Technology
CloudSEK, a provider of AI-driven cybersecurity solutions, has debuted Deep Fake Detection Technology, which is now available for free. The company says this initiative is part of its commitment to providing society with resources to combat cybercrime. Advanced Deep Fake…
Check Point Software Acquires Cyberint
Check Point Software, a cybersecurity solutions provider, has acquired Cyberint Technologies, a company specializing in external risk management solutions. This marks Check Point’s third startup acquisition within the past year. Through this acquisition, Check Point will enhance its Security Operations…
The Future of Network Access Control: Transitioning to Universal ZTNA
The way enterprises secure their networks is undergoing a dramatic shift. Traditional Network Access Control (NAC) solutions, once the cornerstone of access security, need help to keep pace with the complexities and dynamism of modern network environments. A recent Gartner…
Black Kite Research Reveals 80% of Manufacturing Companies Face Critical Cyber Vulnerabilities
A staggering 80% of manufacturing companies have critical vulnerabilities, putting them at heightened risk of cyberattacks. This was one of the findings of Back Kite’s 2024 report, The Biggest Third-Party Risks in Manufacturing. Black Kite is a third-party cyber risk…
Strengthening Security Posture Through People-First Engagement
As attackers continue to find new ways to profit from vulnerabilities, organizations of all sizes face an ever-present threat. With attacks becoming more frequent and businesses growing increasingly desensitized to these risks, the importance of having a comprehensive, proactive response…
China-aligned CeranaKeeper Makes a Beeline for Thailand
Cybersecurity firm ESET has identified a new China-aligned threat actor, dubbed “CeranaKeeper,” operating across Southeast Asia, with a primary focus on Thailand. CeranaKeeper has been carrying out widespread data exfiltration campaigns since early 2022, primarily targeting governmental institutions. The findings…
CISA Warns of Critical Vulnerabilities Switches Used in Critical Manufacturing
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about two critical vulnerabilities in Optigo Networks’ ONS-S8 Spectra Aggregation Switch, a key component in critical infrastructure systems. These vulnerabilities, which affect all versions of the switch up…
Small Steps, Big Impact: Expert Tips for Building a Stronger Cyber Defense
This year’s Cybersecurity Awareness Month theme, “Secure Our World,” emphasizes the importance of simple yet powerful measures everyone can take to protect their businesses, data, and loved ones. While there is no silver bullet to safeguard against all cyber threats,…
Passkeys and Cybersecurity Awareness: A New Era of Business Security
This year, Cybersecurity Awareness Month is themed “Secure Our World,” a stark reminder that simple measures can protect businesses from online threats. The week emphasizes four key strategies: using strong passwords and password managers, turning on multifactor authentication (MFA), recognizing…
More Evil Corp Actors Exposed, Including LockBit Affiliate
In a significant move against one of the world’s most notorious cybercrime groups, the UK has sanctioned 16 individuals linked to Evil Corp, a criminal organization with ties to the Russian state. Among those newly exposed is a key affiliate…
Ambulances Still Diverted as UMC Faces Ongoing Cybersecurity Incident
University Medical Center (UMC) is still grappling with the aftermath of a ransomware attack that occurred last Thursday. The attack caused a widespread IT outage and forced the diversion of emergency and non-emergency patients to nearby facilities. While some services…
Book Review: “Premier CISO – Board & C-Suite” by Michael S. Oberlaender
In his latest work, Premier CISO -Board & C-Suite, Michael S. Oberlaender delivers a comprehensive guide for aspiring and current Chief Information Security Officers (CISOs) navigating the complex landscape of cybersecurity leadership. This book, the third in Michael’s series on…
Three Iranian Cyber Actors Indicted for Election Interference and Hacking Campaign
The U.S. Department of Justice (DOJ) has indicted three Iranian nationals linked to the Islamic Revolutionary Guard Corps (IRGC) for orchestrating a cyberattack aimed at influencing the 2024 US presidential election. The indictment, unsealed today, charges Masoud Jalili, Seyyed Ali…
Critical Infrastructure at Risk: Vulnerabilities Discovered in Automatic Tank Gauging
A recent investigation by Bitsight TRACE has uncovered several critical 0-day vulnerabilities in six Automatic Tank Gauge (ATG) systems from five different vendors. These vulnerabilities are substantial real-world threats, with the potential for exploitation by malicious actors, leading to severe…
The Rise of API Security Automation: Defending the Digital Frontlines with AI and Machine Learning
APIs (Application Programming Interfaces) are the backbone of modern digital services, driving the seamless flow of data and functionality between applications. From enabling quick social media logins to processing payments and connecting complex systems, APIs have revolutionized how businesses operate…
CISA Urges Action as Attackers Exploit Critical Systems Using Basic Tactics
The Cybersecurity and Infrastructure Security Agency (CISA) has once again raised alarms about the ongoing exploitation of operational technology (OT) and industrial control systems (ICS) across critical infrastructure sectors. The warning comes amid an active investigation into a cybersecurity incident…