Trend Micro researchers identified a sophisticated malware campaign that aims at Middle East organizations. The campaign tricks victims into infecting their devices by pretending to be a real Palo Alto GlobalProtect VPN client. The attack begins with the distribution of a malicious file named “setup.exe,” which masquerades as a legitimate …
Read More »BlackByte Ransomware Exploits VMware ESXi Flaw
The BlackByte ransomware group is suspected of using a recently fixed security issue in VMware ESXi hypervisors. They are also taking advantage of weak drivers to bypass security measures. A vulnerability named CVE-2024-37085 lets attackers bypass authentication on VMware ESXi systems connected to an Active Directory domain. By using this …
Read More »NPDC fined Fidelity Bank ₦555.8 Million
Nigeria’s National Data Protection Commission (NDPC) fined Fidelity Bank ₦555.8 million for breaking customer data protection laws. Punch reported that Olatunji said the top bank violated Nigeria’s Data Protection Act and Regulation, resulting in a large fine of 0.1% of the bank’s 2023 revenue. Commissioner emphasized the importance of following …
Read More »BlackMeta Allegedly Targeted Arab National Bank
A post on a Telegram channel said that the Arab National Bank (ANB), one of Saudi Arabia’s biggest financial institutions, was targeted by a threat actor called SN_BLACKMETA. The attack targeted the bank’s infrastructure, as claimed by the threat actor. They said it was part of a larger campaign against …
Read More »DDoS attack costs average $6,000 per minute
DDoS attacks increased by 106% from the second half of 2023 to the first half of 2024. The average duration of a DDoS attack is now 45 minutes, marking an 18% increase from last year and costing unprotected organizations around $270,000 per attack, at an average rate of $6,000 per …
Read More »Ransomware attack on Indian payment system linked to Jenkins bug
Researchers found that recently the ransomware attack on the digital payment system used by many of India’s banks started with a vulnerability in Jenkins, an open-source automation system for software developers. Juniper Networks recently published a study on the abuse of CVE-2024-23897, a vulnerability in Jenkins Command Line Interface. The …
Read More »Massive cyber attack hit Iran’s Central Bank and others
Iran International reported a big cyber attack that disrupted the operations of the Central Bank of Iran and other banks in the country, causing their computer systems to be crippled. This incident coincides with intensified international scrutiny of Iran’s operations in Middle East, as Teheran announced attacks on Israel unless …
Read More »“RayV Lite” Open Source Tool Enables Laser Hacking of Computer Chips
“At the upcoming Black Hat cybersecurity conference in Las Vegas, Sam Beaumont and Larry ‘Patch’ Trowell from NetSPI, a security firm, will showcase their new laser hacking device, the RayV Lite. They intend to release the design and component list of their tool as open source, enabling anyone to access …
Read More »Hackers Abuses Cloudflare Tunnels to Deliver malware
Proofpoint is monitoring a group of cybercriminals using Cloudflare Tunnels to distribute malware. They are exploiting the TryCloudflare feature to create one-time tunnels without needing an account. Tunnels allow remote access to data and resources not on the local network, similar to using a virtual private network (VPN) or secure …
Read More »1M domains at risk of ‘Sitting Ducks’ domain hijacking
More than a dozen threat actors are using a strong attack method in the domain name system (DNS). These hackers can take control of domain names without the owners realizing, and then use them for harmful activities. Infoblox, an IT automation and security company, cautions about this risk. The “Sitting …
Read More »