News
-
"'DoubleDrive' Attack Turns Microsoft OneDrive Into Ransomware"According to SafeBreach researcher Or Yair, Microsoft's OneDrive file-sharing program can be used as ransomware to encrypt most files on a target machine beyond recovery, partly because Windows and Endpoint Detection and Response (EDR) programs…
-
"Most DDoS Attacks Tied to Gaming, Business Disputes, FBI and Prosecutors Say"According to federal officials investigating Distributed Denial-of-Service (DDoS) incidents, most attacks stem from business or gaming disputes. In recent years, much media coverage of DDoS attacks has centered on groups affiliated with or supporting…
-
"Colorado Health Agency Says 4 Million Impacted by MOVEit Hack"The Colorado Department of Health Care Policy and Financing (HCPF) has recently revealed that the personal information of millions of individuals was compromised in a data breach resulting from the recent MOVEit cyberattack. The HCPF informed the…
-
"Ongoing Xurum Attacks Target Magento 2 E-stores"Researchers at Akamai warn of ongoing attacks, dubbed Xurum, against e-commerce websites using the Magento 2 Content Management System (CMS). Attackers are exploiting a server-side template injection vulnerability, tracked as CVE-2022-24086, with a CVSS…
-
"New QwixxRAT Trojan Spreads Through Messaging Apps"A new cybersecurity threat known as QwixxRAT, a Remote Access Trojan (RAT), was recently discovered by the Uptycs Threat Research team in early August 2023. According to the researchers, QwixxRAT has caught attention due to its unusual distribution…
-
"North Korean Hackers Suspected in New Wave of Malicious npm Packages"The npm package registry has been hit in yet another highly targeted attack campaign aimed at luring developers to download malicious modules. According to the software supply chain security company Phylum, the activity resembles a previous attack wave…
-
"What's New in the NIST Cybersecurity Framework 2.0"The National Institute of Standards and Technology's (NIST) Cybersecurity Framework (CSF) has been updated, and is now aimed at organizations of all sizes. The framework was introduced nearly a decade ago as technical cybersecurity guidance for critical…
-
"Threat Actors Use Beta Apps to Bypass Mobile App Store Security"The FBI has issued a warning about a new tactic used by cybercriminals to steal cryptocurrency. The tactic involves the promotion of malicious "beta" versions of cryptocurrency investment apps on mobile app stores. The threat actors submit the apps to…
-
"Navigating Generative AI Risks and Regulatory Challenges"In the second quarter of 2023, according to Gartner, the availability of generative Artificial Intelligence (AI), such as OpenAI's ChatGPT and Google Bard, became a top concern for enterprise risk executives. Generative AI was the second most frequently…
-
"Over 100,000 Users of Hacking Forums Infected With Malware"Security researchers at Hudson Rock have recently discovered over 140,000 breached passwords associated with accounts on hacking forums after their owners were infected with info-stealing malware. The researchers searched their cybercrime…
-
"UK Police Data Breach Exposes Victim Information"The Norfolk and Suffolk police in the UK have recently confirmed the accidental exposure of personal data belonging to more than 1000 individuals, including crime victims. The disclosure occurred within Freedom of Information (FOI) responses issued…
-
"Study: A Social Workplace Keeps Scammers at Bay"A group of professors from the University of Virginia's McIntire School of Commerce recently published an article titled "Phishing Susceptibility in Context: A Multilevel Information Processing Perspective on Deception Detection," which delves into why…