Attackers Exploit Critical Atlassian Confluence Flaw for Cryptojacking

August 28, 2024 at 02:34PM Threat actors are exploiting a critical remote code execution bug in Atlassian to turn cloud environments into cryptomining networks. Trend Micro uncovered attacks that drain network resources using the flaw CVE-2023-22527 in Confluence Data Center and Server. The attackers use various methods and recommended patching the environment to prevent exploitation. … Read more

QBE Insurance Launches Global Cyber Coverage With QCyberProtect

July 17, 2024 at 04:10PM QBE Insurance has unveiled QCyberProtect, a comprehensive global cyber policy offering tailored coverage for emerging cyber risks. The policy includes a network of cyber experts and QCyberPrepare, a risk management tool. Currently available in 10 countries, the policy will be launched in more countries. QBE North America, part of QBE … Read more

Insurance giant Globe Life investigating web portal breach

June 14, 2024 at 08:39AM Globe Life, a financial services company, confirms potential unauthorized access to consumer and policyholder data via a breached web portal. The incident, discovered on June 13, prompted immediate portal closure. The company assures no significant operational impact, initiating incident response and hiring security experts for remediation and impact assessment. Ongoing … Read more

Remote Work’s Hidden Dangers

June 5, 2024 at 10:03AM The global work landscape has shifted due to the COVID-19 pandemic, leading to a rise in remote work. This brings benefits of flexibility and cost savings for employees and employers, but also poses security threats like phishing scams and ransomware. Establishing a robust remote-access policy and cybersecurity strategies is essential … Read more

Decoding Water Sigbin’s Latest Obfuscation Tricks

May 30, 2024 at 01:10AM Summary: Water Sigbin, also known as the 8220 Gang, exploited Oracle WebLogic vulnerabilities to deploy a cryptocurrency miner via a PowerShell script. The group used obfuscation techniques to conceal its activities, including hexadecimal URL encoding and fileless execution. Organizations are advised to prioritize patch management, network segmentation, security audits, employee … Read more

Improving cyber defense with open source SIEM and XDR

May 15, 2024 at 01:16PM A cyber defense strategy is crucial for preventing, detecting, and responding to cyber attacks, mitigating financial loss, reputational damage, and legal repercussions. It involves risk assessment, technology selection, integration, incident response planning, continuous monitoring, and user awareness. Integrating Wazuh, a free, open source security solution, enhances threat detection, incident response, … Read more

LockBit 3.0 Variant Generates Custom, Self-Propagating Malware

April 16, 2024 at 09:47AM The LockBit ransomware group launched a sophisticated attack in West Africa using a leaked variant of LockBit 3.0. Kaspersky discovered this new variant and flagged its ability to generate custom, self-propagating ransomware. The attack involved using leaked privileged credentials and affected multiple systems. Organizations are advised to take preventive measures … Read more

UK businesses shockingly unaware of how to handle security threats

April 9, 2024 at 08:52AM UK businesses’ response to security breaches has “astounded” experts following the release of the 2024 cybercrime stats. The report reveals only 22% have a formal incident response plan, with low reporting rates to authorities. Small businesses drive down figures, showing lack of awareness and seeking outside cybersecurity expertise. Breaches cost … Read more

The Golden Age of Automated Penetration Testing is Here

March 29, 2024 at 08:03AM Automated network penetration testing is a game-changer in cybersecurity, making it affordable and efficient for companies to assess their network security regularly. Benefits include finding and fixing vulnerabilities, catching what other tools miss, improving security operations, avoiding downtime and financial losses, complying with regulations, understanding attackers’ tactics, testing incident response … Read more

Five Eyes tell critical infra orgs: take these actions now to protect against China’s Volt Typhoon

March 20, 2024 at 06:21AM The US government and international partners issued another warning about China’s Volt Typhoon cyber gang targeting critical infrastructure, advising protection measures. They emphasized guidance for non-technical senior leaders, urged cybersecurity best practices, and highlighted the importance of incident response plans and securing the supply chain. The advisory reiterated the gang’s … Read more