Tag

Information Security

MTN Faces Breach, Ensures Core Networks Remain Secure
Cyber Security
MTN Faces Breach, Ensures Core Networks Remain Secure

In a recent cybersecurity incident, MTN Group, Africa’s largest mobile operator, experienced a breach that led to the exposure of personal data for certain customers in selected markets. As the digital landscape evolves with increasing threats, such security breaches serve as reminders of the critical importance of maintaining robust systems to safeguard sensitive information. Although some peripheral components of MTN’s

Read More
Can Cyber Defenses Keep Up with Lumma Stealer’s Rise?
Cyber Security
Can Cyber Defenses Keep Up with Lumma Stealer’s Rise?

The increasing threat landscape in the cybersecurity realm is currently driven by the emergence and prevalence of advanced infostealer malware, particularly the Lumma Stealer. This malicious software is a sophisticated tool explicitly designed to target sensitive information like passwords, cryptocurrency wallets, and two-factor authentication codes. Recent updates to Lumma Stealer have increased its ability to evade detection, posing a significant

Read More
Are We Ready for Rising Data Breach Numbers and Risks?
Cyber Security
Are We Ready for Rising Data Breach Numbers and Risks?

The alarming 26% increase in data breach victims within the United States during the first quarter of this year has sparked growing concerns across various sectors. While the total number of incidents remained mostly stable, dropping slightly from 841 incidents in the previous year to 824 incidents now, the number of victims surged from 72.5 million to an unprecedented 91.3

Read More
Is Your Commvault Command Center Vulnerable to Remote Code Execution?
Cyber Security
Is Your Commvault Command Center Vulnerable to Remote Code Execution?

A critical security vulnerability has been identified in the Commvault Command Center Innovation Release, specifically affecting version 11.38. Known as CVE-2025-34028, this vulnerability allows unauthenticated remote attackers to execute arbitrary code, potentially leading to a complete system compromise. The flaw arises from a path traversal vulnerability that enables malicious ZIP files to be uploaded and expanded within the system, resulting

Read More
Is Your Google Cloud Composer Secure from Privilege Escalation?
Cyber Security
Is Your Google Cloud Composer Secure from Privilege Escalation?

The rise of cloud computing has revolutionized how businesses handle their data and workflows. However, it has also brought new security challenges, particularly regarding privilege escalation. This research delves into Google Cloud Composer’s security, exploring the risks associated with privilege escalation and reviewing the recently uncovered “ConfusedComposer” vulnerability. Background and Context Google Cloud Composer is a managed workflow orchestration service,

Read More
Are You Safe From the Latest Gmail Phishing Attack? Here’s What to Do
Cyber Security
Are You Safe From the Latest Gmail Phishing Attack? Here’s What to Do

Recently, Gmail, one of the most widely used email services with billions of users globally, has come under attack from sophisticated phishing scams. These scams have successfully bypassed Google’s robust security measures, raising significant concerns among users. Recognizing the severity of these attacks, Google has issued an important update, providing guidelines to protect users against such threats. Understanding these steps

Read More
Fog Ransomware’s New Tactics: Insider Threats and Phishing Attacks
Cyber Security
Fog Ransomware’s New Tactics: Insider Threats and Phishing Attacks

Recent months have seen an alarming uptick in the sophistication and audacity of Fog ransomware attacks, exposing new and unsettling tactics that have kept cybersecurity experts on high alert. Trend Micro revealed that throughout March and early April, new variants of the malware have emerged with ransom notes referencing the U.S. Department of Government Efficiency (DOGE) and even incentivizing insider

Read More
Lotus Panda Cyber Espionage Targets Southeast Asia Organizations
Cyber Security
Lotus Panda Cyber Espionage Targets Southeast Asia Organizations

In the complex and ever-evolving world of cybersecurity, the activities of Lotus Panda, a China-linked cyber espionage group, have raised significant concerns as they have compromised multiple organizations across Southeast Asia. Between August 2024 and February 2025, Lotus Panda infiltrated entities, including a government ministry, an air traffic control organization, a telecoms operator, and a construction company. Most notably, the

Read More
Is Your Samsung Clipboard Exposing Your Passwords?
Cyber Security
Is Your Samsung Clipboard Exposing Your Passwords?

Imagine carrying sensitive information around in your pocket, only to find out that it could be easily accessed by someone else. This unsettling scenario highlights a major security lapse identified within Samsung’s One UI system. Users have found, and Samsung has confirmed, that passwords copied to the clipboard on their devices are stored in plain text. The ramifications of this

Read More
Evolving Cyber Threats: Nation-State Attacks and Emerging Exploits
Cyber Security
Evolving Cyber Threats: Nation-State Attacks and Emerging Exploits

The landscape of cybersecurity threats is constantly shifting, driven by the ingenuity of attackers and the vulnerabilities prevalent within systems. Recent incidents from the past week have shed light on how nation-state actors and emerging exploits are reshaping the threat environment. The complexity and persistence of these threats underscore the continuous evolution of tactics employed by cyber adversaries. Recent reports

Read More
How Are Cybercriminals Using AI to Evade Detection?
Cyber Security
How Are Cybercriminals Using AI to Evade Detection?

The integration of artificial intelligence (AI) into the arsenal of cybercriminals has significantly increased the sophistication and success rate of cyber-attacks, posing a formidable challenge to traditional detection methods. As the technology landscape rapidly evolves, so do the tactics of malicious actors who blend AI with social engineering to exploit vulnerabilities in cybersecurity defenses. These developments have rendered conventional security

Read More
Ushur Renews HITRUST r2, Strengthens Security and Compliance
FinTech Insurance
Ushur Renews HITRUST r2, Strengthens Security and Compliance

In today’s highly regulated sectors, such as healthcare, insurance, and financial services, the demand for robust security and compliance measures is more critical than ever. Ushur has strengthened its commitment to data protection and regulatory adherence by renewing its HITRUST r2 certification. Known for its Customer Experience Automation (CXA) platform powered by AI, Ushur offers advanced tools that ensure seamless

Read More