Technology

Cyberattacks Targeting E-commerce Applications

Cyber attacks on e-commerce applications are a common trend in 2023 as e-commerce businesses become more omnichannel, they build and deploy increasingly more API interfaces, with threat actors constantly exploring more ways to exploit vulnerabilities. This is why regular testing and ongoing monitoring are necessary to fully protect web applications, identifying weaknesses so they can […]

Cyberattacks Targeting E-commerce Applications Read More »

KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities

An updated version of a botnet malware called KmsdBot is now targeting Internet of Things (IoT) devices, simultaneously branching out its capabilities and the attack surface. “The binary now includes support for Telnet scanning and support for more CPU architectures,” Akamai security researcher Larry W. Cashdollar said in an analysis published this month. The latest iteration,

KmsdBot Malware Gets an Upgrade: Now Targets IoT Devices with Enhanced Capabilities Read More »

LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants

The leak of the LockBit 3.0 ransomware builder last year has led to threat actors abusing the tool to spawn new variants. Russian cybersecurity company Kaspersky said it detected a ransomware intrusion that deployed a version of LockBit but with a markedly different ransom demand procedure. “The attacker behind this incident decided to use a different ransom

LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants Read More »

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack

Risk and financial advisory solutions provider Kroll on Friday disclosed that one of its employees fell victim to a “highly sophisticated” SIM swapping attack. The incident, which took place on August 19, 2023, targeted the employee’s T-Mobile account, the company said. “Specifically, T-Mobile, without any authority from or contact with Kroll or its employee, transferred

Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack Read More »

Learn How Your Business Data Can Amplify Your AI/ML Threat Detection Capabilities

In today’s digital landscape, your business data is more than just numbers—it’s a powerhouse. Imagine leveraging this data not only for profit but also for enhanced AI and Machine Learning (ML) threat detection. For companies like Comcast, this isn’t a dream. It’s reality. Your business comprehends its risks, vulnerabilities, and the unique environment in which

Learn How Your Business Data Can Amplify Your AI/ML Threat Detection Capabilities Read More »

Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks

Two U.K. teenagers have been convicted by a jury in London for being part of the notorious LAPSUS$ transnational gang and for orchestrating a series of brazen, high-profile hacks against major tech firms and demanding a ransom in exchange for not leaking the stolen information. This includes Arion Kurtaj (aka White, Breachbase, WhiteDoxbin, and TeaPotUberHacker),

Two LAPSUS$ Hackers Convicted in London Court for High-Profile Tech Firm Hacks Read More »

China-Linked Flax Typhoon Cyber Espionage Targets Taiwan’s Key Sectors

A nation-state activity group originating from China has been linked to cyber attacks on dozens of organizations in Taiwan as part of a suspected espionage campaign. The Microsoft Threat Intelligence team is tracking the activity under the name Flax Typhoon, which is also known as Ethereal Panda. “Flax Typhoon gains and maintains long-term access to Taiwanese

China-Linked Flax Typhoon Cyber Espionage Targets Taiwan’s Key Sectors Read More »

Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success

Every company has some level of tech debt. Unless you’re a brand new start-up, you most likely have a patchwork of solutions that have been implemented throughout the years, often under various leadership teams with different priorities and goals. As those technologies age, they can leave your organization vulnerable to cyber threats. While replacing legacy

Navigating Legacy Infrastructure: A CISO’s Actionable Strategy for Success Read More »

Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches

The U.S. Federal Bureau of Investigation (FBI) is warning that Barracuda Networks Email Security Gateway (ESG) appliances patched against a recently disclosed critical flaw continue to be at risk of potential compromise from suspected Chinese hacking groups. It also deemed the fixes as “ineffective” and that it “continues to observe active intrusions and considers all affected Barracuda

Urgent FBI Warning: Barracuda Email Gateways Vulnerable Despite Recent Patches Read More »

New Telegram Bot “Telekopye” Powering Large-scale Phishing Scams from Russia

A new financially motivated operation is leveraging a malicious Telegram bot to help threat actors scam their victims. Dubbed Telekopye, a portmanteau of Telegram and kopye (meaning “spear” in Russian), the toolkit functions as an automated means to create a phishing web page from a premade template and send the URL to potential victims, codenamed Mammoths by the

New Telegram Bot “Telekopye” Powering Large-scale Phishing Scams from Russia Read More »