"AI-Driven Phishing Attacks Deceive Even the Most Aware Users"

"AI-Driven Phishing Attacks Deceive Even the Most Aware Users"

Zscaler reports a rise in deepfake phishing and vishing attacks as generative Artificial Intelligence (AI) enhances social engineering. AI-driven phishing attacks use AI tools to improve campaign sophistication and effectiveness. Phishing becomes harder to detect as AI automates and personalizes attack steps. Threat actors can quickly analyze massive datasets to adjust their attacks and replicate legitimate communications and websites with precision using AI algorithms. Phishers can trick even the most aware users with this sophistication.

Submitted by Gregory Rigby on

"Hackers Target New NATO Member Sweden with Surge of DDoS Attacks"

"Hackers Target New NATO Member Sweden with Surge of DDoS Attacks"

According to network performance management provider Netscout, Sweden has faced a wave of distributed denial of service (DDoS) attacks since it started the process of joining NATO. The company noted that after a 500 Gbps attack against the Swedish government infrastructure in May 2023, DDoS attacks against Swedish organizations increased consistently, picking up significantly in late 2023 with 730 Gbps attacks. In 2024, the attack volume rose significantly from February.

Submitted by Adam Ekwall on

"LockBit, Black Basta, Play Dominate Ransomware in Q1 2024"

"LockBit, Black Basta, Play Dominate Ransomware in Q1 2024"

According to security researchers at ReliaQuest, LockBit, Black Basta, and Play have been the most active ransomware groups in Q1 2024, with Black Basta experiencing a notable 41% increase in activity. The researchers noted that LockBit faced a significant setback due to law enforcement actions in February and despite efforts to restore operations, LockBit’s activity decreased by 21% compared to the previous quarter.

Submitted by Adam Ekwall on

"Security Breach Exposes Dropbox Sign Users"

"Security Breach Exposes Dropbox Sign Users"

Dropbox has recently disclosed a significant breach in its systems, exposing customers’ data to unauthorized entities. The incident, detailed in a new regulatory filing, primarily affected Dropbox Sign, a service akin to DocuSign, allowing users to manage documents online. According to the company, management became aware of the breach on April 24 and promptly initiated cybersecurity measures.

Submitted by Adam Ekwall on

"York Research Collaboration to Improve Cybersecurity Threat Detection, Mitigation"

"York Research Collaboration to Improve Cybersecurity Threat Detection, Mitigation"

York University's Behavior-Centric Cybersecurity Center (BCCC) is working with the network monitoring company cPacket to combat a significant cybercrime threat, Distributed Denial-of-Service (DDoS) attacks. Institutions sometimes detect DDoS attacks too late to stop them. Due to the need for real-time detection to combat this threat, York University's BCCC and the cPacket company collaborated to develop a solution to help cybersecurity researchers study and respond to DDoS attacks more effectively.

Submitted by Gregory Rigby on

"Urgent Warning from Multiple Cybersecurity Organizations on Current Threat to OT Systems"

"Urgent Warning from Multiple Cybersecurity Organizations on Current Threat to OT Systems"

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Environmental Protection Agency (EPA), Department of Energy (DOE), US Department of Agriculture (USDA), Multi-State Information Sharing and Analysis Center (MS-ISAC), and more have released a Fact Sheet urging critical infrastructure organizations to mitigate pro-Russia hacktivist cyber activity against Operational Technology (OT) devices.

Submitted by Gregory Rigby on

"Now Corporate Boards Have Responsibility for Cybersecurity, Too"

"Now Corporate Boards Have Responsibility for Cybersecurity, Too"

The US Securities and Exchange Commission's (SEC) new Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure ruling took effect last fall. Public companies must disclose whether their boards of directors have cybersecurity experts. Keri Pearlson, executive director of the Cybersecurity at MIT Sloan Research Consortium (CAMS), studies organizational, strategic, management, and leadership challenges in cybersecurity, with her current focus being on the board's role.

Submitted by Gregory Rigby on

"The Dangerous Rise of GPS Attacks"

"The Dangerous Rise of GPS Attacks"

Attacks on GPS signals and wider satellite navigation systems, known as GNSS, have increased. Attackers can jam signals, forcing them offline, or spoof signals to make aircraft and ships appear in false locations on maps. Governments and telecommunications organizations, along with airline safety experts, are now warning of disruptions and potential major disasters stemming from such attacks. Attacks against GPS, and the wider GNSS category take two forms.

Submitted by Gregory Rigby on

"Panda Restaurants Discloses Data Breach After Corporate Systems Hack"

"Panda Restaurants Discloses Data Breach After Corporate Systems Hack"

Panda Restaurant Group, the parent company of Panda Express, Panda Inn, and Hibachi-San, recently disclosed a data breach after attackers compromised its corporate systems in March and stole the personal information of an undisclosed number of individuals. Panda Express is the largest Chinese fast food chain in the United States, with over $3 billion in sales and 47,000 associates working in 2,300 branches.

Submitted by Adam Ekwall on

"New Latrodectus Malware Attacks Use Microsoft, Cloudflare Themes"

"New Latrodectus Malware Attacks Use Microsoft, Cloudflare Themes"

Phishing campaigns involving Microsoft Azure and Cloudflare lures are now spreading "Latrodectus" malware. Latrodectus, also known as "Unidentified 111" and "IceNova," is a Windows malware downloader that serves as a backdoor, downloading EXE and DLL payloads or executing commands. Researchers have linked the malware to the developers of the IcedID modular malware loader. The newer malware is increasingly being used in phishing campaigns and contact form spam for initial access to corporate networks.

Submitted by Gregory Rigby on
Subscribe to