Tag cybersecurity

Researchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Cybersecurity experts are raising alarm over significant security risks identified within the machine learning (ML) software supply chain. Investigations have uncovered more than 20 vulnerabilities that could be exploited to compromise MLOps (Machine Learning Operations) platforms, potentially exposing businesses to severe operational risks. These vulnerabilities, categorized as inherent and implementation…

Read MoreResearchers Discover More Than 20 Vulnerabilities in Supply Chains of MLOps Platforms

Fileless Malware Consuming the Computing Resources of Linux Servers

A significant cybersecurity incident is unfolding, with thousands of Linux servers across the globe falling prey to a sophisticated dropper malware. This concerning development involves the deployment of proxyjacking and cryptomining malware, indicating a dangerous shift in the tactics employed by cybercriminals. The primary targets of this attack include organizations…

Read MoreFileless Malware Consuming the Computing Resources of Linux Servers

Data Breach Lawsuits Anticipated to Surge in 2025, Making Fines Just the Beginning for Enterprises

Forrester’s latest report indicates that the financial consequences of data breaches are poised to expand significantly, forecasting that in 2025 the costs associated with class action lawsuits will exceed regulatory fines by 50% for organizations affected by cybersecurity incidents. As companies continue to grapple with the ramifications of cyberattacks, financial…

Read MoreData Breach Lawsuits Anticipated to Surge in 2025, Making Fines Just the Beginning for Enterprises

Robbery and Extortion

Emerging Threats Highlighted in 2024 Attack Intelligence Report The "2024 Attack Intelligence Report" by Rapid7 delivers critical insights into the evolving landscape of cybersecurity threats. This comprehensive report outlines alarming trends regarding vulnerabilities exploited in the past year, particularly emphasizing the dominance of zero-day vulnerabilities. Of the more than thirty…

Read MoreRobbery and Extortion

DarkGate Malware Targets Samba File Shares in Brief Surge Attack

Cybersecurity Experts Uncover DarkGate Malware Campaign Targeting Samba File Shares In a recent investigation, cybersecurity analysts have unveiled a brief yet impactful campaign associated with DarkGate malware, which exploited Samba file sharing services as a vector for infection. Researchers from Palo Alto Networks’ Unit 42 indicated that the campaign occurred…

Read MoreDarkGate Malware Targets Samba File Shares in Brief Surge Attack

MSSP Market Update: Court Evaluates Liability for Data Breaches

Security Concerns Heightened Amid Data Breach at Columbus Regional Healthcare System Recent developments surrounding the data breach at Columbus Regional Healthcare System (CRHS) underscore the escalating concerns over cybersecurity vulnerabilities in the healthcare sector. A federal class-action lawsuit has emerged from this incident, alleging that CRHS failed to adequately protect…

Read MoreMSSP Market Update: Court Evaluates Liability for Data Breaches

Fortra Releases Patch to Address Critical FileCatalyst Workflow Security Vulnerability

Fortra has disclosed a significant security vulnerability in FileCatalyst Workflow that could allow remote attackers to obtain administrative access. This flaw, designated as CVE-2024-6633, holds a critical CVSS score of 9.8, primarily due to the software’s reliance on a static password for its HSQL database connection. In their advisory, Fortra…

Read MoreFortra Releases Patch to Address Critical FileCatalyst Workflow Security Vulnerability

Magento Sites Hit by Covert Credit Card Skimmer Using Swap Files

Recent cybersecurity investigations have unveiled a sophisticated approach employed by threat actors, who are utilizing swap files on compromised websites to facilitate the operation of a persistent credit card skimmer designed to capture sensitive payment information. Security firm Sucuri identified this method on the checkout page of a Magento e-commerce…

Read MoreMagento Sites Hit by Covert Credit Card Skimmer Using Swap Files

Hackers Exploit Unpatched AVTECH IP Camera Vulnerability for Botnet Attacks

Malicious Actors Exploit AVTECH IP Camera Vulnerability in Botnet Campaign A significant cybersecurity threat has emerged as a long-standing high-severity vulnerability in AVTECH IP cameras has been exploited by cybercriminals. Known as CVE-2024-7029, this flaw, which has a CVSS score of 8.7, is categorized as a command injection vulnerability associated…

Read MoreHackers Exploit Unpatched AVTECH IP Camera Vulnerability for Botnet Attacks