Category: cyber-security

Russian Hacker Accused of Worldwide Computer System Attacks: Summary

Russian Hacker Accused of Worldwide Computer System Attacks: Summary

Russian Hacker Targets Computer Systems Worldwide Ruslan Magomedovich Astamirov allegedly targeted computer systems in the US, Asia, Europe, and Africa A Russian hacker named Ruslan Magomedovich Astamirov has been accused of targeting computer systems worldwide. According to reports, Astamirov, who is believed to be in his late 20s or early 30s, aimed his attacks at

Read More
New Malware Variant Discovered on BingeChat and Chatico: Protect Yourself with These Tips

New Malware Variant Discovered on BingeChat and Chatico: Protect Yourself with These Tips

ESET Discovers New Malware Variant Distributed Through BingeChat and Chatico Antivirus software company ESET has recently discovered a new malware variant being distributed through messaging apps BingeChat and Chatico. The malware is disguised as an innocuous-looking app called ‘Adult Player’ and tricks users into downloading and installing it onto their devices. The Malware’s Modus Operandi

Read More
New Espionage Campaign “GhostEye” Targets Southeast Asia Organizations: Mandiant

New Espionage Campaign “GhostEye” Targets Southeast Asia Organizations: Mandiant

Mandiant Uncovers New Espionage Campaign Key Points: Mandiant, a cybersecurity firm, has announced the discovery of a new espionage campaign targeting organizations in Southeast Asia. The campaign, code-named “GhostEye,” is believed to have been active since at least July 2021. The attackers behind GhostEye have employed various tactics, including spear-phishing emails and the use of

Read More
Chainalysis Report: Misuse of Virtual Asset Services for Money Laundering

Chainalysis Report: Misuse of Virtual Asset Services for Money Laundering

Chainalysis Identifies Misuse of Virtual Asset Services Threat Actors are Using Mixers and Exchanges to Launder Money Cybersecurity firm Chainalysis has released a report claiming that virtual asset services like mixers and exchanges are being heavily misused by threat actors to launder money. According to the report, these cybercriminals use these platforms to obscure the

Read More
Progress Software Rushes Out Critical Security Update to Protect User Data

Progress Software Rushes Out Critical Security Update to Protect User Data

Progress Software scrambles to address critical security flaw Key Points: – Progress Software has come under fire for a recent critical security flaw in their software. – The flaw allows unauthorized access to sensitive information and poses a significant risk to affected users. – Progress has released a new security update to patch the vulnerability

Read More
“Cybersecurity vs. Cyber Resilience: Understanding the Shift in the Cyber Community and the Digital Operational Resilience Act (DORA)”

“Cybersecurity vs. Cyber Resilience: Understanding the Shift in the Cyber Community and the Digital Operational Resilience Act (DORA)”

Cybersecurity vs. Cyber Resilience Shift in Cyber Community The conversations and debates within the cyber community have evolved from cybersecurity to cyber resilience. Many experts are embracing cyber resilience as the new way to approach cyber threats and attacks. The Digital Operational Resilience Act The EU has taken the lead in this shift towards cyber

Read More
“The Critical SSL-VPN RCE Vulnerability Fix: What Fortinet’s Release Notes Didn’t Tell You”

“The Critical SSL-VPN RCE Vulnerability Fix: What Fortinet’s Release Notes Didn’t Tell You”

The Truth Behind SSL-VPN RCE Vulnerability Fix Release notes did not mention the critical SSL-VPN RCE vulnerability being addressed If you’re using an SSL-VPN by Fortinet, you might want to pay attention to this. Recently, Fortinet released its security update that listed down all the fixes it contained. However, it seems that they missed out

Read More
Kaspersky’s Unique Multistage Malware Attack: Who’s at Risk?

Kaspersky’s Unique Multistage Malware Attack: Who’s at Risk?

Multistage Malware Attack Discovered by Kaspersky Security company Kaspersky has uncovered a new type of malware that uses a multistage attack method. The Attack The attackers conduct a phishing attack on the victim to deliver the first stage malware, which then communicates with a command-and-control server for the second stage malware. If the second stage

Read More
Cybersecurity Risks for Industrial Control Systems: Mitigating Threats in Manufacturing, Energy, and Critical Infrastructure

Cybersecurity Risks for Industrial Control Systems: Mitigating Threats in Manufacturing, Energy, and Critical Infrastructure

Cybersecurity Risks for Industrial Control Systems Main Points Engineering workstations, SCADA and automation servers, historians and PLCs identified as highest risk. Manufacturing, energy and utilities, and critical infrastructure at greatest risk. Risks include malicious attacks, insider threats and unintended consequences of updates. Risks Identified for Industrial Control Systems Recent studies indicate that engineering workstations, SCADA

Read More
British Tech Industry Urges Collaboration for Cybersecurity in Critical Sectors

British Tech Industry Urges Collaboration for Cybersecurity in Critical Sectors

British Tech Trade Association Calls for Collaboration for Securing Critical Sectors The tech industry in the UK is calling on the government and other industry actors to collaborate in an effort to improve the security of critical sectors. This comes as a response to the increasing number of cyber threats and attacks on vital infrastructure,

Read More
0

Your Cart Is Empty

No products in the cart.