Tag Malware

CISA Suggests New Security Measures for Bulk Data Sales

Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response Also: Payment Card Theft Trends, Internet Archive Update Anviksha More (AnvikshaMore) • October 24, 2024 Image: Shutterstock This week’s cybersecurity roundup reveals significant developments globally, highlighting the U.S. government’s actions to restrict bulk data transfers to China, alongside Visa’s warnings about…

Read MoreCISA Suggests New Security Measures for Bulk Data Sales

Over 110,000 Websites Compromised in Polyfill Supply Chain Attack

Polyfill.io Supply Chain Attack Compromises Over 110,000 Websites In a concerning development for e-commerce and web developers, Google has responded to a supply chain attack targeting the widely used Polyfill.io service. The attack follows the acquisition of the domain by a Chinese company, which has modified the JavaScript library "polyfill.js"…

Read MoreOver 110,000 Websites Compromised in Polyfill Supply Chain Attack

Safeguard Your Fleet Against Cyber Threats: 10 Essential Steps

Cyberattacks disrupting various businesses have become increasingly prevalent in today’s digital landscape, notably impacting fleet operations. These cyber threats compromise not just vehicle functionality and cargo but also safety, data integrity, and ultimately, the financial health of the organization. Acknowledging these challenges is the fundamental first step toward enhancing cybersecurity…

Read MoreSafeguard Your Fleet Against Cyber Threats: 10 Essential Steps

The 2024 Browser Security Report Reveals the Hidden Dangers of Every Web Session

As the browser becomes the dominant workspace in enterprises, it is increasingly exploited by cybercriminals as a key attack vector. Various threats ranging from account takeovers and phishing attacks to malicious browser extensions highlight the browser’s role in compromising sensitive data and breaching organizational systems. Security professionals tasked with developing…

Read MoreThe 2024 Browser Security Report Reveals the Hidden Dangers of Every Web Session

Nokia Highlights Cybersecurity Risks in the Telecom Industry

Recent findings published in the Nokia Threat Intelligence Report reveal a troubling increase in vulnerabilities facing the global telecommunications industry, with a particular emphasis on North America. The incorporation of Generative AI (GenAI) and automated strategies by cybercriminals is significantly intensifying these threats, leading to heightened risks for telecom operators.…

Read MoreNokia Highlights Cybersecurity Risks in the Telecom Industry

Andariel Hackers Strike South Korean Institutions with New Dora RAT Malware

North Korean Threat Actor Deploys New Golang-Based Backdoor Targeting South Korean Sectors Recent reports indicate that the North Korea-affiliated threat actor known as Andariel has introduced a new backdoor, identified as Dora RAT, into their cyberattack arsenal. This malware has been employed in attacks that primarily target educational institutions, manufacturing…

Read MoreAndariel Hackers Strike South Korean Institutions with New Dora RAT Malware

Celebrity TikTok Accounts Hacked with Zero-Click Attack Through DMs

TikTok Confirms Security Breach Targeting High-Profile Accounts TikTok has recently acknowledged a significant security vulnerability that has allowed threat actors to take control of prominent accounts on its platform. This incident, which has raised serious concerns about user safety and data security, was initially reported by Semafor and Forbes, highlighting…

Read MoreCelebrity TikTok Accounts Hacked with Zero-Click Attack Through DMs

Fileless Malware Consuming the Computing Resources of Linux Servers

A significant cybersecurity incident is unfolding, with thousands of Linux servers across the globe falling prey to a sophisticated dropper malware. This concerning development involves the deployment of proxyjacking and cryptomining malware, indicating a dangerous shift in the tactics employed by cybercriminals. The primary targets of this attack include organizations…

Read MoreFileless Malware Consuming the Computing Resources of Linux Servers