Tag

Information Security

Roblox Developers Targeted by Malware in Fake npm Packages Attack
Cyber Security
Roblox Developers Targeted by Malware in Fake npm Packages Attack

As Roblox continues to maintain its position as one of the most popular online gaming platforms with over 79.5 million daily users as of mid-2024, the large developer community associated with it has become a prime target for cybercriminals. A recent cyberattack has specifically targeted Roblox developers through malicious npm packages designed to steal credentials and personal information. This latest

Read More
Massive MOVEit Breach Exposes Data of Millions Across Major Industries
Cyber Security
Massive MOVEit Breach Exposes Data of Millions Across Major Industries

The recent discovery of a significant data breach due to a critical vulnerability in the MOVEit file transfer software has sent shockwaves through various industry sectors. Identified as CVE-2023-34362, this breach has compromised the sensitive information of millions of employees across 25 major organizations, including financial, technological, healthcare, and retail companies. Operating under the alias “Nam3L3ss,” the hacker has revealed

Read More
Can AI Granny Contain the Rising Threat of Scam Phone Calls?
Cyber Security
Can AI Granny Contain the Rising Threat of Scam Phone Calls?

The increasing frequency of scam phone calls has become a significant concern, with a majority of Brits wary of being caught in the fraudulent web. Over two-thirds of the population express apprehension about phone fraud, while an alarming one in five has endured weekly attempts. To counter this burgeoning menace, Virgin Media O2 has introduced an innovative solution: an AI-powered

Read More
Ransomware Attackers Target Cloud Services for Data Exfiltration
Cyber Security
Ransomware Attackers Target Cloud Services for Data Exfiltration

In an alarming development, ransomware attackers have increasingly turned to exploiting cloud services, such as Amazon S3 and Microsoft Azure Blob Storage, to facilitate data exfiltration and increase the pressure on their victims for ransom payments. The SentinelLabs report highlights this growing trend, where these popular cloud storage services are being leveraged for compromising IT systems. The Growing Trend This

Read More
Can Fortinet’s Vulnerable Codebase Survive Sophisticated Cyber Threats?
Cyber Security
Can Fortinet’s Vulnerable Codebase Survive Sophisticated Cyber Threats?

In a recent development that has heightened concerns in the cybersecurity community, watchTowr, a prominent attack surface management provider, has identified a new zero-day vulnerability in Fortinet products. Dubbed "FortiJump Higher," this flaw allows a managed FortiGate device to elevate its privileges and gain control over the FortiManager instance, posing significant risks to the security of these systems. The discovery

Read More
Are Your AI Models at Risk of Security Flaws and Data Exfiltration?
Cyber Security
Are Your AI Models at Risk of Security Flaws and Data Exfiltration?

When Palo Alto Networks’ Unit 42 recently discovered two significant security vulnerabilities in Google’s Vertex AI machine learning (ML) platform, it highlighted notable risks. These vulnerabilities have the potential to lead to unauthorized access, privilege escalation, and critical data exfiltration if exploited. Vertex AI, introduced in May 2021, offers a scalable environment for training and deploying custom ML models and

Read More
How Is DEEPDATA Malware Exploiting Fortinet VPN for Credential Theft?
Cyber Security
How Is DEEPDATA Malware Exploiting Fortinet VPN for Credential Theft?

Amid the constantly evolving landscape of cybersecurity threats, a new and troubling development has surfaced involving malware known as DEEPDATA. Deployed by the notable threat actor BrazenBamboo, DEEPDATA takes advantage of a vulnerability in Fortinet’s FortiClient for Windows to steal VPN credentials. This alarming vulnerability was first reported by Volexity in July 2024 and, worryingly, remains unpatched to this day.

Read More
Dubai Hosts Web3 Unleashed Hackathon Showcasing Top Blockchain Talent
Fintech Blockchain
Dubai Hosts Web3 Unleashed Hackathon Showcasing Top Blockchain Talent

On November 20, the bustling city of Dubai will be the stage for the grand finale of MENA’s flagship Web3 hackathon, hosted by Bybit and DMCC Crypto Centre. This event promises to be a pivotal moment for the blockchain and cryptocurrency community, as 15 innovative projects are set to present their cutting-edge Web3 visions. Originally, only ten projects were scheduled

Read More
Critical Flaw in TP-Link Routers: Remote Takeover and DoS Risk
Cyber Security
Critical Flaw in TP-Link Routers: Remote Takeover and DoS Risk

A significant security vulnerability has been discovered in TP-Link VN020-F3v(T) routers with firmware version TT_V6.2.1021. This flaw, identified as CVE-2024-11237, allows attackers to remotely take over the routers, leading to potential Denial of Service (DoS) and Remote Code Execution (RCE) attacks. These attacks can severely impact network functionality and compromise data security by allowing unauthorized access and control over network

Read More
Will NSO Group Face Consequences for Hacking WhatsApp With Pegasus Spyware?
Cyber Security
Will NSO Group Face Consequences for Hacking WhatsApp With Pegasus Spyware?

In the world of cybersecurity, the actions of surveillance technology firms have become a subject of intense scrutiny, particularly as they relate to privacy violations and unauthorized access to digital platforms. One prominent case is that of the NSO Group, an Israeli surveillance technology firm known for its Pegasus spyware, which has faced significant legal challenges following revelations that it

Read More
Is Chinese Linked Cyber-Espionage on Telecoms the Largest Yet?
Cyber Security
Is Chinese Linked Cyber-Espionage on Telecoms the Largest Yet?

A major cyber-espionage campaign linked to Chinese intelligence has infiltrated numerous U.S. and international telecom companies, including T-Mobile, raising alarms about the security of global communications. The attack is being described by U.S. officials as "historic" and "catastrophic," having primarily targeted high-value intelligence figures and lasting for over eight months. The sophisticated hackers exploited vulnerabilities in telecom infrastructure and employed

Read More
Bitcoin Options Expiry on Dec 27, 2024, Could Lead to Market Volatility
Fintech Blockchain
Bitcoin Options Expiry on Dec 27, 2024, Could Lead to Market Volatility

As December 27, 2024, approaches, the cryptocurrency market is bracing for significant upheavals driven by the impending expiration of an enormous $11.8 billion in Bitcoin options. This looming event is generating intense interest among traders and analysts alike, with the high stakes involved prompting widespread speculation about resultant market movements. Bitcoin’s current price, which hovers just above $90,000, reflects an

Read More