Risk and Compliance

Risk and Compliance Page 1

Bug Corsair Keyboards Type Own Digital Risk Firmware

Bug on Corsair keyboards allows it to type on its own

A company spokesperson responsible for producing Corsair keyboards has confirmed that a flaw in the firmware of their K100 keyboards is the cause of typing on its own. The company’s announcement materialised after numerous K100 keyboard users reported a bug in which the keyboards are auto typing at random moments. The incident was first reported...
Continue Reading
Hikvision Flaw Vulnerability Exploit Security Camera Hacker CCTV Botnet

Hikvision flaw exposed more than 80K cameras to hackers

A previously identified flaw tracked as CVE-2021-36260 was found affecting over 80,000 Hikvision cameras that, if not patched, would allow threat actors to abuse. A firmware update that addressed the vulnerability was published by Hikvision last September 2021. However, there are still thousands of systems left unpatched that are used by numerous organisations worldwide, exposing...
Continue Reading
Microsoft Threat Warning 8220 Crypto Mining Threat Group Linux

Microsoft warns users regarding the 8220 mining group

The Microsoft company has released a threat advisory regarding a mining gang called 8220 that targets the Linux operating system. Moreover, this newly discovered threat group has been seen installing crypto-mining malware. According to the researchers, the adversary was spotted with an updated malware campaign that included a new strain of IRC bot and a...
Continue Reading
CERT-IN User Data Incident Report Threat Analysis India VPN ISP Policy Enforcement

CERT-IN to collect user data aiming to solve incident analysis issues

India has recently mandated all internet service providers to gather their respective user data for the last five years, based on a press release by the CERT-IN (Indian Computer Emergency Response Team). CERT-In also added that they would be amassing data from service providers such as data centres, VPNs, body corporate, and intermediaries under the...
Continue Reading
Package Backfill Cyberattack Campaign Amazon Web Services Cloud Computing

A package backfill campaign targets the Amazon Web Services

In the latter days of April, a researcher identified, obstructed, and reported two packages that they classified as malicious versions of original AWS packages. This package backfill discovery showed a new takeover method that targets AWS, where hackers scan AWS projects for dependencies that are not assessed in the public npmjs registry and use their...
Continue Reading
Log4j Flaw Vulnerability Expose Devices Cyberattacks

The Log4j flaw still exposes thousands of devices to cyberattacks

Several months after security analysts found the critical zero-day flaw under the Java logging library Apache Log4j, they disclosed that many servers and applications are still prone to cyberattacks posed by the flaw due to failure to apply proper security patches. The vulnerability tracked as CVE-2021-44228 was first detailed last December, allowing hackers to launch...
Continue Reading
Lenovo Windows Firmware Flaws UEFI Attacks BIOS Notebook Ideapad Legion

Lenovo users are warned of three firmware flaws launching UEFI attacks

Three firmware bugs were found in Lenovo devices, which the tech firm immediately patched after discovering that they could be exploited for Unified Extensible Firmware Interface (UEFI) attacks. The vulnerabilities were assigned as CVE-2021-3970, CVE-2021-3971, and CVE-2021-3972 and used for deploying and executing UEFI malware through SPI flash implants or ESP implants inside Lenovo Notebook...
Continue Reading
Lazarus APT South Korea Chemical Sector Cyberespionage Operation Dream Job APT

The Lazarus APT targeted South Korea’s chemical sector

The North Korean-sponsored advanced persistent threat (APT) group called Lazarus targets organisations that operate in South Korea’s chemical sector. This current espionage campaign appears to be the sequel of the Operation Dream Job conducted by the same APT group discovered by researchers in August last year. At the beginning of the year, a research team...
Continue Reading
DoJ Russian Malware Watch Guard Asus Cyclops Blink Sandworm

DoJ eradicated the Russian malware that impacted WatchGuard and Asus

The US Department of Justice (DOJ) has announced that they have successfully eradicated the Cyclops Blink malware that attacked vulnerable internet-connected firewall devices of WatchGuard and Asus tech firms. This operation interrupted the Russian Federation’s Main Intelligence Directorate (GRU)’s control over the botnet that infected thousands of devices. Previously attributed to Russia’s GRU, the Sandworm...
Continue Reading
BitRAT Malware Distribution Impersonation Windows Activator Pirated Software Crack

BitRAT distributes itself by impersonating as Windows Activator

The BitRAT malware campaign is seen attacking users searching for unofficial Windows license activators to activate cracked or pirated Windows Operating System versions. Security researchers observed a phishing attack that distributes Windows 10 Pro license activators in an online store. However, the offered activators of the phishing actors are malicious and composed of BitRAT malware....
Continue Reading
1 2 3 9