Data Complexity Report by NetApp highlights that an astonishing 98% of organizations worldwide are undertaking this transformative journey. Three out of four companies still rely on on-premises data storage, highlighting the continued significance of having infrastructure within the organization. In the future, it is important to have a single data …
Read More »
Web injections back
40+ banks affected by new malware campaign
IBM Security Trusteer researchers found a new malware campaign using JavaScript web injections in March 2023. It’s widespread and evasive, with historical Indicators of Compromise (IOCs) suggesting a possible link to DanaBot. ALSO READ: Chrome adds background scans for compromised passwords Web injections, a technique used by banking trojans, are …
Read More »Chrome adds background scans for compromised passwords
Chrome Safety Check feature in Google will check if saved passwords in the browser have been compromised. This check will be done in the background. Chrome alerts desktop users about dangerous extensions that have been removed from the Chrome Web Store. This happens in the latest version of Chrome and …
Read More »
Microsoft warn
New ‘FalseFont’ Backdoor Target Defense Sector
Microsoft warn Iranian threat actor has targeted organizations in the Defense Industrial Base (DIB) sector with a campaign involving a new type of backdoor called FalseFont. Microsoft found the activity related to Peach Sandstorm (previously known as Holmium), also called APT33, Elfin, and Refined Kitten. FalseFont is a type of …
Read More »
ReversingLabs report
Hackers Abusing GitHub Platform Hosting Malware
Researchers found two new techniques on GitHub. One uses GitHub Gists, and the other uses Git commit messages to send commands. Malware creators sometimes upload their malware to Dropbox, Google Drive, OneDrive, and Discord to hide it and avoid being detected. ALSO READ: Fake security researchers push malware files on …
Read More »Most cloud transformations are stuck in the middle
Research indicates that although cloud transformation is considered a top-three critical investment for 60% of enterprises, only 1 in 4 can show a positive return on investment from their initiatives. ALSO READ: FBI Seized ALPHV/Blackcat Ransomware Dark web Site HFS and IBM Consulting report that enterprise technology is constantly changing, …
Read More »
FBI Offers Decryption Tool
FBI Seized ALPHV/Blackcat Ransomware Dark web Site
The FBI and European security organizations working under Europol have seized ALPHV’s website also known as Blackcat. ALPHV ransomware has infected over 1,000 victims worldwide. Cybercrime has a popular model called ransomware-as-a-service. This model involves a group of developers who create and update ransomware. They also maintain the necessary internet …
Read More »
Iran’s state TV said
Suspected cyberattack paralyzes 70% gas stations across Iran
Iran’s Oil Minister, Javad Owji, confirmed on Monday that a cyberattack caused a widespread disruption to petrol stations. A hacking group Iran blames Israel for claimed it caused the attack that disrupted petrol stations across the country on Monday, according to Iranian state TV and Israeli local media. ALSO READ: …
Read More »
New survey by IDC
Malaysia face doubling of ransomware incidents in 2023
In Malaysia, the cybersecurity situation is changing as organizations deal with an increase in cyber threats. A recent survey by IDC shows that phishing is the main concern, with 54% of organizations ranking it as the biggest threat. The top five risks in Malaysia are ransomware, unpatched vulnerabilities, identity theft, …
Read More »
Draft emergency plan
China to enforce 10 min response time for data breaches
China proposed a four-tier classification to respond to data security incidents, showing its concern about data leaks and hacking in the country. The plan is due to increased tensions with the United States and its allies. It follows an incident where a hacker claimed to have gotten a large amount …
Read More »