admin

Vdor podatkov: Zlonamerni akterji trdijo, da so razkrili podatke uLektz Learning Solutions

Vdor podatkov: Zlonamerni akterji trdijo, da so razkrili podatke uLektz Learning Solutions

Zlonamerna akterja IntelBroker in EnergyWeaponUser sta naj bi razkrila podatkovno bazo podjetja uLektz Learning Solutions Private Limited, indijskega podjetja, ki se ukvarja z izobraževalno tehnologijo. Ta incident, ki je bil prvič prijavljen 6. novembra 2024, je sprožil zaskrbljenost glede kibernetske varnosti uporabniških podatkov v hitro rastočem sektorju EdTech. Po poročanju vsebuje razkrita podatkovna baza občutljive…

Read More
SteelFox and Rhadamanthys Malware: How Copyright Scams and Driver Exploits Target Victims

SteelFox and Rhadamanthys Malware: How Copyright Scams and Driver Exploits Target Victims

CopyRh(ight)adamantys: The Rise of Phishing Campaigns Using Copyright Themes An ongoing phishing campaign is employing copyright infringement-related themes to trick victims into downloading a newer version of the Rhadamanthys information stealer since July 2024. Cybersecurity firm Check Point is tracking this large-scale campaign under the name CopyRh(ight)adamantys. Targeted regions include the United States, Europe, East…

Read More
5 Most Common Malware Techniques in 2024

5 Most Common Malware Techniques in 2024

Understanding Tactics, Techniques, and Procedures (TTPs) in Cyber Defense Tactics, techniques, and procedures (TTPs) are essential components of modern cybersecurity strategies. Unlike indicators of compromise (IOCs), which can change rapidly, TTPs are more stable and thus provide a reliable method for identifying specific cyber threats. According to ANY.RUN's Q3 2024 report on malware trends, understanding…

Read More
Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco Releases Patch for Critical URWB Vulnerability in Industrial Wireless Systems

Cisco Security Update for Ultra-Reliable Wireless Backhaul Access Points Cisco has recently released security updates to address a critical vulnerability affecting Ultra-Reliable Wireless Backhaul (URWB) Access Points. Tracked as CVE-2024-20418, this flaw has a maximum severity rating with a CVSS score of 10.0. It potentially allows unauthenticated remote attackers to execute commands with elevated privileges….

Read More
Canada Orders TikTok Shutdown Over Security Concerns

Canada Orders TikTok Shutdown Over Security Concerns

Canada Orders TikTok to Dissolve Operations: What You Need to Know On Wednesday, the Canadian government made a significant decision regarding TikTok, a popular video-sharing platform owned by ByteDance. The government ordered TikTok to dissolve its operations within Canada. This decision comes in light of national security concerns raised by various intelligence agencies. Although the…

Read More
VEILDrive Attack: Evading Detection with Microsoft Services

VEILDrive Attack: Evading Detection with Microsoft Services

Understanding the VEILDrive Threat Campaign The ongoing VEILDrive threat campaign has been observed using legitimate Microsoft services such as Teams, SharePoint, Quick Assist, and OneDrive. This exploitation allows the attackers to take advantage of established trust with previously compromised organizations. By leveraging these trusted infrastructures, the campaign has significant implications for cybersecurity. How VEILDrive Operates…

Read More
New Winos 4.0 Malware: How Gamers Are Being Targeted Through Malicious Game Optimization Apps

New Winos 4.0 Malware: How Gamers Are Being Targeted Through Malicious Game Optimization Apps

Understanding the Threat of Winos 4.0 in Gaming Applications Cybersecurity researchers are raising alarms about a harmful command-and-control (C&C) framework called Winos. This advanced malware is being secretly distributed through various gaming-related applications, such as installation tools, speed boosters, and optimization utilities. Winos 4.0 poses a significant threat due to its comprehensive functionality and ability…

Read More
9 Steps to Get CTEM on Your 2025 Budgetary Radar

9 Steps to Get CTEM on Your 2025 Budgetary Radar

Navigating Budget Season in Cybersecurity Budget season is upon us, and it often feels like a battlefield. Different departments rush to stake their claims for funding. Each area presents their projects as vital for profitability, continuity, or even the future of the organization. As cybersecurity professionals, we must sift through these requests, prioritizing what truly…

Read More
INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime

INTERPOL Targets Cyber Threats with Operation Synergia II INTERPOL recently announced the success of Operation Synergia II, a massive global initiative aimed at taking down malicious servers linked to various cyber threats. Read on to discover how this operation helped eliminate phishing, ransomware, and information stealer infrastructures. Overview of Operation Synergia II Running from April…

Read More
IT Security Alert: South Korea Slaps Meta with $15.67M Fine for Unauthorized Sharing of User Data

IT Security Alert: South Korea Slaps Meta with $15.67M Fine for Unauthorized Sharing of User Data

Meta Fined for Illegal Data Collection in South Korea Meta, the parent company of Facebook, has recently faced a significant penalty from South Korea's data privacy watchdog. The Personal Information Protection Commission (PIPC) imposed a fine of 21.62 billion won (approximately $15.67 million) on Meta for illegally collecting sensitive personal information from Facebook users. This…

Read More