Researchers found two new techniques on GitHub. One uses GitHub Gists, and the other uses Git commit messages to send commands. Malware creators sometimes upload their malware to Dropbox, Google Drive, OneDrive, and Discord to hide it and avoid being detected. ALSO READ: Fake security researchers push malware files on …
Read More »ReversingLabs report
Most cloud transformations are stuck in the middle
Research indicates that although cloud transformation is considered a top-three critical investment for 60% of enterprises, only 1 in 4 can show a positive return on investment from their initiatives. ALSO READ: FBI Seized ALPHV/Blackcat Ransomware Dark web Site HFS and IBM Consulting report that enterprise technology is constantly changing, …
Read More »
FBI Offers Decryption Tool
FBI Seized ALPHV/Blackcat Ransomware Dark web Site
The FBI and European security organizations working under Europol have seized ALPHV’s website also known as Blackcat. ALPHV ransomware has infected over 1,000 victims worldwide. Cybercrime has a popular model called ransomware-as-a-service. This model involves a group of developers who create and update ransomware. They also maintain the necessary internet …
Read More »
Iran’s state TV said
Suspected cyberattack paralyzes 70% gas stations across Iran
Iran’s Oil Minister, Javad Owji, confirmed on Monday that a cyberattack caused a widespread disruption to petrol stations. A hacking group Iran blames Israel for claimed it caused the attack that disrupted petrol stations across the country on Monday, according to Iranian state TV and Israeli local media. ALSO READ: …
Read More »
New survey by IDC
Malaysia face doubling of ransomware incidents in 2023
In Malaysia, the cybersecurity situation is changing as organizations deal with an increase in cyber threats. A recent survey by IDC shows that phishing is the main concern, with 54% of organizations ranking it as the biggest threat. The top five risks in Malaysia are ransomware, unpatched vulnerabilities, identity theft, …
Read More »
Draft emergency plan
China to enforce 10 min response time for data breaches
China proposed a four-tier classification to respond to data security incidents, showing its concern about data leaks and hacking in the country. The plan is due to increased tensions with the United States and its allies. It follows an incident where a hacker claimed to have gotten a large amount …
Read More »5 Islamic banks risk of being frozen out of certain transactions
Five Islamic banks current accounts with Bangladesh Bank are negative, but transactions are ongoing. The central bank has warned that unless the banks meet liquidity requirements within 20 days, transactions will be halted, reported Prothom Alo. According to Three prominent media reports Bangladesh Bank’s Motijheel office has recently given this …
Read More »
CERT-In
Warning! Govt alerts Samsung users; here’s why
The Indian government urgently asked Samsung smartphone users to update their devices due to security vulnerabilities. CERT-In issued a warning about a threat to certain Samsung devices running on Android versions 11, 12, 13, and 14. These vulnerabilities could be exploited to gain unauthorized access to sensitive data on these …
Read More »
MITRE Reveals EMB3D
MITRE reveals Critical Infrastructure Threat Model Framework
Red Balloon Security, Narf Industries, and MITRE worked together to develop the EMB3D Threat Model. This model helps us understand the risks that embedded devices face and the security measures they require. The EMB3D model is a framework that focuses on embedded devices. “It considers the specific risks presented by …
Read More »“Onpassive”, Bangladesh bank alert fraudulent activities
Bangladesh Bank’s Financial Intelligence Unit (BFIU) warned about the fraudulent activities of the MLM company ‘Onpassive‘. BFIU issued a warning on Thursday (December 14). ALSO READ: Quishing: New Phishing Attacks Tactics Rising The intelligence unit has reported that there have been cases of large-scale embezzlement from ordinary people through different …
Read More »