Tag

Information Security

International Operation Shuts Down 8Base, Arrests 4 Phobos Ransomware Members
Cyber Security
International Operation Shuts Down 8Base, Arrests 4 Phobos Ransomware Members

On February 10, 2025, a significant success in the fight against cybercrime took place when law enforcement agencies seized the dark web data leak site of the notorious ransomware group 8Base and arrested four suspected members of the Phobos ransomware operation in Thailand. This development, part of Operation Phobos Aetor, represents a coordinated effort by international authorities to combat ransomware

Read More
OpenAI Credentials Claim Debunked: Data Likely from Infostealer Logs
Cyber Security
OpenAI Credentials Claim Debunked: Data Likely from Infostealer Logs

Recent cybersecurity developments have been buzzing with a rather alarming claim by a threat actor who alleged that they possessed tens of millions of OpenAI account logins from a supposed data breach. Yet, after a thorough investigation, it appears that these claims have been debunked. According to the renowned threat intelligence firm, Kela, the credentials in question were not obtained

Read More
Are You Updating Ivanti Software to Address Critical Vulnerabilities?
Cyber Security
Are You Updating Ivanti Software to Address Critical Vulnerabilities?

The recent revelations about critical vulnerabilities in Ivanti software products have sparked significant concern within the cybersecurity community. Ivanti has released crucial security updates to address multiple severe flaws in its Connect Secure (ICS), Policy Secure (IPS), and Cloud Services Application (CSA) products. These vulnerabilities, if left unpatched, pose a considerable risk to users, as they can be exploited to

Read More
How Is Fireblocks Enhancing Soneium’s Blockchain Security and Usability?
Fintech Blockchain
How Is Fireblocks Enhancing Soneium’s Blockchain Security and Usability?

Fireblocks, a prominent blockchain enterprise platform well-known for its crypto custody solutions, has embarked on a significant collaboration with Sony’s new Ethereum layer-2 blockchain, Soneium. One of the standout features of this integration is the implementation of Fireblocks’ embedded wallets. These wallets utilize non-custodial multi-party computation (MPC) technology to provide simplified and secure wallet management within decentralized applications. In addition

Read More
Can Malaysia Lead ASEAN in Advancing Cybersecurity Diplomacy?
Cyber Security
Can Malaysia Lead ASEAN in Advancing Cybersecurity Diplomacy?

As ASEAN countries grapple with the complexities of digital age threats, Malaysia stands at a pivotal moment with the opportunity to lead the region in advancing cybersecurity diplomacy, renowned for its strategic geographical and political positioning within the association. This leadership role becomes even more critical as Malaysia takes on the chairmanship of ASEAN, tasked with addressing not only local

Read More
XE Group Expands from Card Skimming to Supply Chain Cyber Attacks
Cyber Security
XE Group Expands from Card Skimming to Supply Chain Cyber Attacks

Cybercrime has taken a new turn as XE Group, historically known for stealing credit card information, has now ventured into supply chain attacks. The transformation of cyber threats witnessed with XE Group underlines their adaptive capabilities and serves as a stark reminder of the need for fortified cybersecurity in an increasingly interconnected digital landscape. From E-commerce Exploits to Supply Chain

Read More
Is KULR Technology’s Bitcoin Investment a Bold Treasury Strategy?
Fintech Blockchain
Is KULR Technology’s Bitcoin Investment a Bold Treasury Strategy?

KULR Technology Group Inc.’s decision to significantly invest in Bitcoin marks a noteworthy pivot in the company’s financial strategy, one that places the cryptocurrency at the heart of its treasury assets. This audacious move has not only drawn the attention of market analysts but also spotlights the broader trend of corporate Bitcoin adoption. With the company’s recent purchase of $10

Read More
Are Used Seagate Hard Drives Being Sold as New After Cryptocurrency Mining?
Fintech Blockchain
Are Used Seagate Hard Drives Being Sold as New After Cryptocurrency Mining?

Recent findings have uncovered a troubling trend in which used Seagate data center-grade hard drives, many originally deployed in cryptocurrency mining operations, are being sold as new. This deceitful practice was brought to light through various buyer complaints and a thorough investigation by the German news portal Heise. This investigation revealed that altered internal logs of these hard drives are

Read More
How Did International Agencies Dismantle 8Base Ransomware Network?
Cyber Security
How Did International Agencies Dismantle 8Base Ransomware Network?

The recent takedown of the 8Base ransomware network marks a significant victory in the ongoing battle against cybercrime. This operation, codenamed Operation Phobos Aetor, was a collaborative effort involving multiple international law enforcement agencies. The success of this mission underscores the importance of cross-border cooperation in tackling sophisticated cyber threats. The 8Base ransomware group had been a significant threat since

Read More
Enhancing Business Data Security Through Blockchain Technology
DevOps
Enhancing Business Data Security Through Blockchain Technology

In today’s rapidly evolving digital landscape, the necessity for stronger data protection measures has become paramount, given the prevalence of cyber threats such as attacks, data breaches, and fraud. Blockchain technology emerged primarily through its association with cryptocurrencies but has now evolved into a crucial mechanism for bolstering data security across various industries. This article explores how blockchain technology can

Read More
How Did Thai Authorities Capture the 8Base Ransomware Group?
Cyber Security
How Did Thai Authorities Capture the 8Base Ransomware Group?

In a major triumph against global cybercrime, Thai authorities have arrested four European nationals connected to the infamous 8Base ransomware group. The operation, “Phobos Aetor,” included raids in four locations in Phuket, resulting in the seizure of the group’s dark web infrastructure. The arrested individuals, two men and two women, stand accused of executing ransomware attacks affecting over 1,000 victims

Read More
How Is the Sault Tribe Managing the Recent Ransomware Attack?
Cyber Security
How Is the Sault Tribe Managing the Recent Ransomware Attack?

The Sault Tribe of Chippewa Indians, which operates Kewadin Casinos, faced a significant disruption caused by a recent cyber attack. Known as a ransomware attack, it severely impacted various computer and phone systems across the tribal administration. This encompassed not only the casinos but also health centers and other affiliated businesses. The tribe had to implement immediate action to counteract

Read More