Tag

Information Security

Will Removing Contactless Payment Limit Boost UK’s Digital Finance?
Digital Lending / Digital Payments
Will Removing Contactless Payment Limit Boost UK’s Digital Finance?

The UK Financial Conduct Authority (FCA) has announced a groundbreaking decision to remove the £100 contactless payment limit. This move is expected to significantly enhance the flexibility available to businesses and consumers, reflecting the growing success of digital wallets with biometric logins. These wallets currently bypass the contactless payment limit, offering a more secure and convenient method of payment. The

Read More
Emerging Ransomware Tactics Exploit Teams and Email to Breach Networks
Cyber Security
Emerging Ransomware Tactics Exploit Teams and Email to Breach Networks

The increasing sophistication of ransomware groups is posing a significant threat to organizations worldwide, with Russian ransomware entities employing advanced tactics to exploit communication platforms like Microsoft Teams and email systems. These tactics not only facilitate network breaches but also expose vulnerable organizations to data exfiltration and extortion. Sophos, a cybersecurity firm, has been closely tracking these developments, focusing on

Read More
Is Your System Safe from Oracle’s Latest Critical Vulnerabilities?
Cyber Security
Is Your System Safe from Oracle’s Latest Critical Vulnerabilities?

Oracle has unveiled its January 2025 Critical Patch Update (CPU), addressing a staggering 318 newly discovered security vulnerabilities across its broad spectrum of products and services. This latest update carries significant importance, emphasizing the necessity of immediate implementation to mitigate potential risks, especially pertaining to the critical flaw identified within the Oracle Agile Product Lifecycle Management (PLM) Framework, marked as

Read More
How Are Botnets Exploiting Router Flaws for Massive DDoS Attacks?
Cyber Security
How Are Botnets Exploiting Router Flaws for Massive DDoS Attacks?

The growing menace of cyber threats continues to evolve, with malicious actors discovering and exploiting new vulnerabilities in technology infrastructure, leading to significant disruptions and security breaches worldwide. In recent events, threat actors have taken advantage of an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to propagate a variant of the AISURU botnet, known as AIRASHI, aimed at distributed

Read More
Bitcoin Hits $104,972 Amid Volatility and Institutional Interest
Fintech Blockchain
Bitcoin Hits $104,972 Amid Volatility and Institutional Interest

In a dramatic turn of events, Bitcoin has surged to approximately $104,972, marking a 2.29% increase from its previous close and hitting an intraday range between $102,033 and $107,245. This surge comes hot on the heels of January 20, when Bitcoin reached an all-time high of $109,071, fueled by investor optimism surrounding U.S. President Donald Trump’s inauguration. However, the lack

Read More
Ransomware Groups Exploit Microsoft 365 and Teams in New Attacks
Cyber Security
Ransomware Groups Exploit Microsoft 365 and Teams in New Attacks

Recent developments in cybersecurity have revealed that ransomware groups are now leveraging popular tools like Microsoft 365 and Microsoft Teams to execute sophisticated attacks. Researchers at Sophos have identified multiple clusters of hacking activities wherein attackers exploited Microsoft 365 instances, Teams, and email bombing tactics to deliver ransomware between November and December 2024. This method showcases an alarming shift in

Read More
HPE Investigates Cyberattack by Hacker Claiming Theft of Sensitive Data
Cyber Security
HPE Investigates Cyberattack by Hacker Claiming Theft of Sensitive Data

Hewlett Packard Enterprise Co. (HPE) is currently investigating a potentially significant data breach after a hacker, known as “IntelBroker,” apparently infiltrated the company’s internal development environments and exfiltrated sensitive data. The incident came to light on January 16 when IntelBroker posted that they had obtained valuable information from HPE’s systems, raising concerns about the security of the tech giant’s assets

Read More
How Does Tezos’ Quebec Upgrade Enhance Speed and Security?
Fintech Blockchain
How Does Tezos’ Quebec Upgrade Enhance Speed and Security?

Tezos has successfully activated its 17th protocol upgrade, known as Quebec, marking another significant advancement for the blockchain. This update introduces several key improvements aimed at enhancing the network’s overall functionality and efficiency. One of the primary changes is the reduction of block time from 10 seconds to 8 seconds, allowing transactions to reach finality in just 16 seconds. This

Read More
Is the DoNot Team Using Android Malware for Intelligence Collection?
Cyber Security
Is the DoNot Team Using Android Malware for Intelligence Collection?

In the ever-evolving landscape of cybersecurity, the DoNot Team, an Indian-origin hacking group also referred to as APT-C-35, Origami Elephant, SECTOR02, and Viceroy Tiger, has emerged as a significant threat with their sophisticated methods of cyber attacks. This group, known for its persistent and targeted attacks, has recently been linked to a newly discovered Android malware called Tanzeem and Tanzeem

Read More
Murdoc Botnet Exploits IoT Devices, Targets Cameras and Routers
Cyber Security
Murdoc Botnet Exploits IoT Devices, Targets Cameras and Routers

In a significant wave of cyber attacks, the Murdoc_Botnet, a variant of the notorious Mirai malware, is targeting AVTECH cameras and Huawei HG532 routers by exploiting specific known vulnerabilities. Researchers from Qualys have flagged this threat after identifying over 1,300 active IP addresses involved in the botnet campaign since July 2024. The Murdoc_Botnet leverages weaknesses in firmware with CVE-2024-7029 and

Read More
Fortinet Data Breach Exposes VPN Credentials and Device Configurations
Cyber Security
Fortinet Data Breach Exposes VPN Credentials and Device Configurations

The recent data breach involving Fortinet, a leading cybersecurity firm renowned for its security appliances and software, has sent shockwaves through the industry. The exposure of dated configuration data and virtual private network (VPN) credentials for 15,474 Fortinet devices on the Dark Web has raised serious concerns about the potential repercussions for the affected organizations. The Breach and Its Immediate

Read More
U.S. Imposes Sanctions on Chinese Entities for Cyber Espionage Activities
Cyber Security
U.S. Imposes Sanctions on Chinese Entities for Cyber Espionage Activities

The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) has recently imposed sanctions on a Chinese cybersecurity company, Sichuan Juxinhe Network Technology Co., LTD., and a Shanghai-based cyber actor, Yin Kecheng. These sanctions are a response to their involvement with Chinese cyber espionage groups Silk Typhoon and Salt Typhoon, which have been implicated in a significant hack compromising the

Read More