Tag

Information Security

Fog Ransomware’s New Tactics: Insider Threats and Phishing Attacks
Cyber Security
Fog Ransomware’s New Tactics: Insider Threats and Phishing Attacks

Recent months have seen an alarming uptick in the sophistication and audacity of Fog ransomware attacks, exposing new and unsettling tactics that have kept cybersecurity experts on high alert. Trend Micro revealed that throughout March and early April, new variants of the malware have emerged with ransom notes referencing the U.S. Department of Government Efficiency (DOGE) and even incentivizing insider

Read More
Lotus Panda Cyber Espionage Targets Southeast Asia Organizations
Cyber Security
Lotus Panda Cyber Espionage Targets Southeast Asia Organizations

In the complex and ever-evolving world of cybersecurity, the activities of Lotus Panda, a China-linked cyber espionage group, have raised significant concerns as they have compromised multiple organizations across Southeast Asia. Between August 2024 and February 2025, Lotus Panda infiltrated entities, including a government ministry, an air traffic control organization, a telecoms operator, and a construction company. Most notably, the

Read More
Is Your Samsung Clipboard Exposing Your Passwords?
Cyber Security
Is Your Samsung Clipboard Exposing Your Passwords?

Imagine carrying sensitive information around in your pocket, only to find out that it could be easily accessed by someone else. This unsettling scenario highlights a major security lapse identified within Samsung’s One UI system. Users have found, and Samsung has confirmed, that passwords copied to the clipboard on their devices are stored in plain text. The ramifications of this

Read More
Evolving Cyber Threats: Nation-State Attacks and Emerging Exploits
Cyber Security
Evolving Cyber Threats: Nation-State Attacks and Emerging Exploits

The landscape of cybersecurity threats is constantly shifting, driven by the ingenuity of attackers and the vulnerabilities prevalent within systems. Recent incidents from the past week have shed light on how nation-state actors and emerging exploits are reshaping the threat environment. The complexity and persistence of these threats underscore the continuous evolution of tactics employed by cyber adversaries. Recent reports

Read More
How Are Cybercriminals Using AI to Evade Detection?
Cyber Security
How Are Cybercriminals Using AI to Evade Detection?

The integration of artificial intelligence (AI) into the arsenal of cybercriminals has significantly increased the sophistication and success rate of cyber-attacks, posing a formidable challenge to traditional detection methods. As the technology landscape rapidly evolves, so do the tactics of malicious actors who blend AI with social engineering to exploit vulnerabilities in cybersecurity defenses. These developments have rendered conventional security

Read More
Ushur Renews HITRUST r2, Strengthens Security and Compliance
FinTech Insurance
Ushur Renews HITRUST r2, Strengthens Security and Compliance

In today’s highly regulated sectors, such as healthcare, insurance, and financial services, the demand for robust security and compliance measures is more critical than ever. Ushur has strengthened its commitment to data protection and regulatory adherence by renewing its HITRUST r2 certification. Known for its Customer Experience Automation (CXA) platform powered by AI, Ushur offers advanced tools that ensure seamless

Read More
Russian Hackers Target European Diplomats with Sophisticated Malware
Cyber Security
Russian Hackers Target European Diplomats with Sophisticated Malware

European diplomats are facing a new cyber threat, as the Russian nation-state actor known as Midnight Blizzard, also referred to as Cozy Bear or APT29, has launched a phishing campaign targeting their systems. Midnight Blizzard, connected to Russia’s foreign intelligence service (SVR), is notorious for its espionage operations directed at governments and critical industries. This recent campaign uses sophisticated methods

Read More
Hertz Data Breach Tied to Cleo Software Flaws Affects Thousands
Cyber Security
Hertz Data Breach Tied to Cleo Software Flaws Affects Thousands

A significant data breach has impacted Hertz Corporation due to vulnerabilities within the Cleo file transfer software. This incident, which took place between October and December 2024, involved the theft of sensitive personal data by an unauthorized third party. Hertz discovered the breach on February 10, 2025, and concluded its data analysis on April 2, revealing that over 3,400 Maine

Read More
Is Your Device at Risk from the Erlang SSH Vulnerability?
Cyber Security
Is Your Device at Risk from the Erlang SSH Vulnerability?

A critical security vulnerability has been discovered in the Erlang/Open Telecom Platform (OTP) SSH implementation, arousing significant concern among security professionals and organizations reliant on this technology. Known as CVE-2025-32433, this flaw has garnered a maximum Common Vulnerability Scoring System (CVSS) score of 10.0, unmistakably indicating its severity and potential for exploitation. The vulnerability stems from the improper handling of

Read More
NASCAR Hit by Medusa Ransomware Attack Demanding $4 Million
Cyber Security
NASCAR Hit by Medusa Ransomware Attack Demanding $4 Million

The cybersecurity landscape has been jolted by a recent attack on the National Association for Stock Car Auto Racing (NASCAR). The Medusa ransomware group has reportedly executed a substantial cyberattack, demanding a staggering $4 million ransom to thwart the release of sensitive data. This breach, unveiled on Medusa’s dark web leak site on April 8, involves the theft of over

Read More
Hertz Data Breach Exposes Customer Information Due to Zero-Day Attack
Cyber Security
Hertz Data Breach Exposes Customer Information Due to Zero-Day Attack

In a significant and concerning development for both the automotive rental industry and cybersecurity circles, Hertz Corporation experienced a massive data breach that compromised sensitive customer information. The breach resulted from a zero-day vulnerability in Cleo Communications’ file transfer software, which exposed a wide array of personal data belonging to customers and highlighted the risks and growing trend of ransomware

Read More
Justice Department Launches Program to Safeguard Americans’ Data
Cyber Security
Justice Department Launches Program to Safeguard Americans’ Data

Data security has become one of the most pressing concerns for governments worldwide, as advanced technologies escalate the potential misuse of sensitive information. In response, the US Justice Department has introduced the Data Security Program, aimed at preventing the acquisition of personal data by foreign governments. This program, following a February 2024 executive order under the Biden administration, seeks to

Read More