Industry News

Industry News Page 1

Infosec Community Privacy Threat Group Windows Information Security Cybersecurity

The Infosec community targeted by a threat group that exploits Windows

A malicious threat group targets the information security (Infosec) community with phoney Windows Proof-of-Concept vulnerability. These fake exploits compromise the targeted devices with a Cobalt Strike beacon backdoor. The threat actors operating these current attacks are taking advantage of the latest repaired Windows remotely controlled exploit flaws. Moreover, a threat actor published two Proof-of-Concept exploits...
Continue Reading
UK Government Nuclear Cybersecurity Strategy Digital Risk United Kingdom Cyber Threats

The UK government deployed an improved nuclear cybersecurity strategy

The government of the United Kingdom has revealed its cybersecurity strategy for its upcoming civil nuclear sector. These plans are expected to increase security design and improve collaboration and troubleshooting. Experts stated that this move made by the UK government is a much-needed upgrade since their country boasts the oldest civil nuclear power program worldwide,...
Continue Reading
Biometrics SIM Alarms Data Security Privacy InfoSec South Africa

Biometrics-to-SIM proposal caused alarms for data security

The South African phone users have expressed their concerns about their data security after a proposal to put their biometric data on SIM cards was proposed by lawmakers in their country. A committee included the Independent Communications Authority of South Africa’s proposal in the list of draft regulations released by the watchdog for public commentary...
Continue Reading
Global Phishing Attacks Records Phishing-as-a-Service Cyber Threat SMiShing

The global phishing attacks last year have broken previous records

Phishing attacks from last year have broken previous records from the past years. Experts claimed that the emergence of phishing-as-a-service methods and new attack vectors caused this massive upsurge of the attacks. Some researchers also think that the low barrier of entry contributed to the widespread of similar attacks. Threat actors take advantage of current...
Continue Reading
UK backs US Cybersecurity Russia Ukraine Conflict Hackers

The UK backs the US’s concern regarding the Russia/Ukraine conflict

The UK’s top cyber security authority has supported the United State government’s call for setting a solid defense against hackers, especially from Moscow, during this Russia/Ukraine geopolitical conflict. According to the NCSC, the current war near their region should encourage security providers to develop a more vigilant way of countering risks. The NCSC also recommends...
Continue Reading
Mandiant Google Cloud Cybersecurity Portfolio Security Threats

Mandiant gets included in Google Cloud’s cybersecurity portfolio

Google has recently revealed big news regarding their latest acquisition of a threat intelligence and cybersecurity firm, Mandiant, sold in an all-cash deal of $5.4 billion. After the acquisition has been finalised, Mandiant will be added to the array of Google’s cybersecurity portfolio, including VirusTotal, BeyondCorp Enterprise, Cybersecurity Action Team, and Chronicle, which is expected...
Continue Reading
ICANN Ukraine Russia Global Internet Access TLD

ICANN refuses Ukraine’s call to limit Russia’s access to the internet

Since the beginning of Russia’s invasion, Ukraine has been seeking the help of different companies and organizations worldwide to be their ally against the threats of the attacking country. One of the requests that Ukraine has made is for the Internet Corporation for Assigned Names and Numbers or ICANN to revoke Russia’s top-level domains and...
Continue Reading
Poisoned Pipeline Execution PPE Cyberattack Targeting Repositories Cloud Storage Database

Poisoned Pipeline Execution (PPE) attack seen targeting repositories

Security researchers have demonstrated a new method called Poisoned Pipeline Execution (PPE) that abuses permissions inside Source Code Management (SCM) repositories. Experts claim that the new approach exploit can lead to poisoned pipeline attacks. Moreover, the researchers noted that the Poisoned Pipeline Execution focuses on utilising CI configuration files stored in pipeline repositories. These files...
Continue Reading
Ransomware Cyber Attack FinalSite School Website Outage Academic School Services

Ransomware attack against FinalSite caused school website outages

A school website services provider called FinalSite has experienced a ransomware attack resulting in numerous shutdowns of school websites globally. The website services provider is a SaaS (software-as-a-service) that offers website makeover, hosting, design, and content management solutions for senior high school districts and universities. FinalSite has provided website solutions for approximately 8,000 academic institutions...
Continue Reading
Electromagnetic Field Detect Evasive Malware Detection IOT Devices Cybersecurity

Electromagnetic field utilised to detect evasive malware on devices

A newly developed method to detect stealthy malware on IoT devices has been created by cybersecurity researchers, which uses electromagnetic field emanations to identify existing malware in every device. The method can also be applied to detecting obfuscated malware. The recent discovery was introduced by researchers from IRISA (Research Institute of Computer Science and Random...
Continue Reading
1 2 3 14