17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

September 13, 2024 at 09:57AM British authorities announced the arrest of a 17-year-old male in connection with a cyber attack on Transport for London. The attack led to unauthorized access of customer data, including bank account numbers and sort codes. The individual has been released on bail, while the investigation remains ongoing. Another 17-year-old from … Read more

Fortinet Data Breach Impacts Customer Information

September 13, 2024 at 05:03AM Fortinet confirmed a data breach after a hacker leaked 440 Gb of data allegedly obtained from an Azure Sharepoint instance. The hacker, named ‘Fortibitch,’ released information on accessing an AWS S3 bucket storing the data. However, Fortinet clarified that less than 0.3% of customer data was compromised, and no evidence … Read more

Evasion Tactics Used By Cybercriminals To Fly Under The Radar

September 12, 2024 at 09:36AM Cybersecurity involves an ongoing battle of wits between attackers and defenders. Attackers employ evasion tactics such as cryptic service usage, device ID spoofing, time-based evasion, AI-enhanced anomaly detection, trust abuse in cloud applications, HTML smuggling, and innovative phishing evasion techniques. To counter these tactics, organizations should reduce their attack surface, … Read more

Google Introduces ‘Air-Gapped’ Backup Vault to Thwart Ransomware

September 11, 2024 at 02:06PM Google has introduced a new backup storage vault feature in its cloud service to defend against ransomware attacks. The feature offers immutable and indelible backups, safeguarding data from tampering and unauthorized deletion. It aims to protect backed-up data during encryption and extortion cyberattacks, providing secure storage and reliable recovery options … Read more

Wiz Launches Wiz Code Application Security Tool

September 11, 2024 at 12:04AM Wiz launched Wiz Code, a cloud app security product that identifies and resolves cloud risks in code before they become critical issues. It integrates with developer environments, highlighting security issues and providing fix suggestions. Wiz Code aims to enhance collaboration between security and development teams by aligning issues with their … Read more

GitHub Actions Vulnerable to Typosquatting, Exposing Developers to Hidden Malicious Code

September 6, 2024 at 11:45AM Threat actors use typosquatting to deceive users into accessing malicious sites or downloading compromised software. They exploit typing errors in open-source repositories like PyPI, npm, and GitHub Actions to introduce supply chain attacks. Cloud security firm Orca’s findings reveal the vulnerability of even trusted platforms like GitHub Actions. Users are … Read more

White House Unveils Roadmap to Fix BGP

September 5, 2024 at 08:11AM The White House’s Roadmap to Enhancing Internet Routing Security addresses BGP vulnerabilities, emphasizing RPKI adoption to mitigate risks. The plan urges network operators, providers, and government entities to implement cybersecurity risk management plans and RPKI components. Despite progress, further actions, such as policy changes and wider RPKI adoption, are advocated … Read more

Application builders get ready

September 3, 2024 at 04:58AM The Grey Matter ISV Partner Day on 9 October will bring together Microsoft-focused ISVs, SaaS Providers, and application builders from the UK and Ireland. The free event at Select Car Leasing Stadium features content tracks on the latest Microsoft technologies, with experts covering topics including data, AI, cloud security, and … Read more

Novel attack on Windows spotted in phishing campaign run from and targeting China

September 1, 2024 at 11:13PM Unknown attackers have utilized Tencent’s cloud for a phishing campaign targeting Chinese entities, as uncovered by Securonix. The campaign involves delivering Cobalt Strike payloads through phishing emails, establishing persistence and remaining undetected within systems. The attack methodically targets specific Chinese business or government sectors, using advanced exploitation frameworks such as … Read more

Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking

August 28, 2024 at 02:34PM Threat actors are exploiting a critical remote code execution bug in Atlassian to turn cloud environments into cryptomining networks. Trend Micro uncovered attacks that drain network resources using the flaw CVE-2023-22527 in Confluence Data Center and Server. The attackers use various methods and recommended patching the environment to prevent exploitation. … Read more