Criminal IP and Tenable Partner for Swift Vulnerability Detection

January 9, 2024 at 11:33AM Criminal IP, a Cyber Threat Intelligence search engine developed by AI SPERA, has partnered with Tenable for threat analysis and exposure management. It streamlines essential IP address data to Tenable’s platform, empowering users to proactively identify and mitigate potential threats. This collaboration provides a comprehensive solution for cybersecurity strategy and … Read more

Turkish Hackers Target Microsoft SQL Servers in Americas, Europe

January 9, 2024 at 11:24AM A new report from cybersecurity firm Securonix warns that financially motivated threat actors based in Turkey have been targeting Microsoft SQL Server databases with ransomware attacks. The campaign, primarily aimed at organizations in the US, Europe, and Latin America, involves various malicious activities including brute-forcing credentials, executing shell commands, and … Read more

Bangladesh Election App Crashes Amid Suspected Cyberattack

January 9, 2024 at 10:56AM Ukraine and Germany are accused of launching a cyberattack to disrupt a Bangladesh national election app. The app, used to provide election updates and candidate data, is impacted by slow performance. Although the exact nature of the attack is not specified, it’s suspected to be caused by botnets from Ukraine … Read more

Beware Weaponized YouTube Channels Spreading Lumma Stealer

January 9, 2024 at 10:41AM Attackers are distributing Lumma Stealer through YouTube channels featuring cracked application tutorials, using open source platforms to bypass web filters. The malware targets sensitive user information and is spread through malicious URLs in YouTube descriptions. Fortinet researchers outlined the attack process and advised caution regarding application downloads to avoid malware … Read more

Continuity in Chaos: Applying Time-Tested Incident Response to Modern Cybersecurity

January 9, 2024 at 10:12AM At Blackhat 2004, the founder of Red Cliff Consulting presented on “The Evolution of Incident Response,” addressing challenges like increasing attack complexity, evolving response methodologies, and the need for pre-incident preparation. Despite technological advancements, core incident response principles remain the same. Issues like email, patching, and human error persist. Three … Read more

It’s Time to Close the Curtain on Security Theater

January 9, 2024 at 10:05AM The text discusses the concept of security theater in cybersecurity, criticizing the superficial measures and controls implemented by organizations. It highlights the detrimental effects of security theater and provides recommendations to shift focus towards proactive risk mitigation, including conducting risk assessments, prioritizing security enhancements, and implementing cyberattack prevention strategies. Key … Read more

Google Search bug shows blank page in Firefox for Android

January 9, 2024 at 09:50AM Users of Firefox for Android are experiencing a blank page when attempting to load Google Search and localized Google sites. This issue has been confirmed to affect Firefox Mobile 121.0 for Android 13 and Nightly 123, and versions starting v65. The problem stems from a server-side issue with the User-Agent … Read more

TitanHQ Launches PhishTitan to Combat Advanced Phishing Attacks

January 9, 2024 at 09:14AM TitanHQ has launched PhishTitan Integrated Cloud Email Security (ICES), a cutting-edge native M365 anti-phishing solution. It effectively blocks and remediates threats like business email compromise, account takeover, and zero-day attacks. The solution, quickly adopted by existing customers, offers unbeatable phishing protection within M365 and boasts various key features to combat … Read more

LoanDepot Takes Systems Offline Following Ransomware Attack

January 9, 2024 at 09:06AM Mortgage firm LoanDepot was hit by a ransomware attack, leading to system disruptions. The company took immediate steps to contain the incident and initiated an investigation. It shut down certain systems and started notifying regulators and law enforcement. It’s uncertain if personal information was compromised, and the company is assessing … Read more

Bosch Nutrunner Vulnerabilities Could Aid Hacker Attacks Against Automotive Production Lines

January 9, 2024 at 09:06AM Researchers from Nozomi Networks have uncovered significant vulnerabilities in Bosch Rexroth nutrunners used in the automotive industry, potentially allowing hackers to gain control of these devices remotely. The vulnerabilities, including over two dozen security holes, pose serious threats to operational and reputational integrity. Bosch Rexroth plans to address the flaws … Read more