Saturday , January 4 2025

International

Microsoft Teams exploiting tool on GitHub, What Microsoft say?

A new tool is available on GitHub that gives attackers a way to leverage a recently disclosed vulnerability in Microsoft Teams and automatically deliver malicious files to targeted Teams users in an organization. The tool, dubbed “TeamsPhisher,” works in environments where an organization allows communications between its internal Teams users …

Read More »

Decrypter released for Akira ransomware

Akira ransomware first appeared in 2017. It targeted video folders and encrypted the files without leaving any ransom notes. The encrypted files had the extension “.akira”. Researchers have been working on decrypting the files affected by Akira ransomware, and they have finally made a breakthrough. Researchers at Avast have found …

Read More »

Hackers disrupt Russian satellite communications provider

A group of hackers claiming affiliation with the Wagner Group has taken down Dozor-Teleport, a Russian satellite communications provider used by energy companies and the country’s defense and security services. The attack, which began on Wednesday at 10 p.m. EST, has resulted in the disconnection of Dozor-Teleport from the internet …

Read More »

Akira ransomware targets VMware ESXi servers

The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide. Akira first emerged in March 2023, targeting Windows systems in various industries, including education, finance, real estate, manufacturing, and consulting. Like other enterprise-targeting ransomware gangs, the threat actors steal data from …

Read More »

MITRE releases new list of top 25 most dangerous software bugs

MITRE, a non-profit organization that provides research and development in the areas of cybersecurity and information assurance, has released its list of the top 25 most dangerous software weaknesses. The list is based on data from the Common Vulnerabilities and Exposures (CVE) database, which is a repository of known security …

Read More »

Saudi Arabia’s Cyber Capabilities Ranked Second Globally

The Kingdom of Saudi Arabia has been ranked second in the Global Cybersecurity Index in the World Competitiveness Yearbook for 2023. The index is compiled by the International Institute for Management Development (IMD) and assesses the cybersecurity capabilities of 63 economies around the world. Saudi Arabia’s strong performance in the …

Read More »

Submarine Cables at Growing Risk of Cyber-Attacks

Insikt Group research examines the complex and dynamic risk environment of submarine cables, the information superhighways that underpin the global economy and facilitate worldwide telecommunications. The rapid expansion of the submarine cable network in the 21st century, driven by data demands, cloud computing, and the needs of hyperscalers like Amazon, …

Read More »

Ireland: Draconian law to make data protection procedures confidential

Ahead of a discussion in the Oireachtas (Irish parliament) today on a proposed amendment to a bill that would allow the Irish Data Protection Commission (DPC) to label all matters before it as confidential, Rasha Abdul-Rahim, Programme Director at Amnesty Tech, said: “The government’s attempt to allow the Irish Data …

Read More »