< p style=”text-align: justify;”>MITRE Corporation has published its findings from the latest round of ATT&CK evaluations, offering important insights into the effectiveness of enterprise cybersecurity solutions. This sixth evaluation assessed 19 vendors against two major ransomware strains, Cl0p and…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
File-Sharing Tools Under Attack: What Users Need to Know
A serious flaw has been found in three widely used file-sharing tools, putting several organizations at risk of security breaches. The three tools affected, LexiCom, VLTransfer, and Harmony, are all developed by Cleo, a company focused on managed file…
Group-IB Unveils Sophisticated Phishing Campaign Targeting Global Organizations
A recent report by Group-IB has exposed a highly advanced phishing campaign targeting employees from 30 companies across 15 jurisdictions. Using trusted domains and cutting-edge personalization techniques, attackers have bypassed Secure Email Gateways (SEGs) and exploited victims in critical…
Active Exploitation of Cleo Communications’ File Transfer Software Exposes Critical Vulnerabilities
< p style=”text-align: justify;”>Cleo Communications’ file transfer software is under active attack, with security researchers from Huntress revealing that a recently issued patch fails to address the critical flaws being exploited. This ongoing vulnerability poses a significant threat to…
Is Bitcoin Vulnerable to Google’s Quantum Breakthrough?
Earlier this month, Google CEO Sundar Pichai announced the creation of their new quantum computing chips called “Willow“, which caused a few ripples in the Bitcoin investment community, but also caused some skepticism among Bitcoin skeptics due to the…
Data Breach at Datavant Exposes Thousands of Minors to Cyber Threats
< p style=”text-align: justify;”>While cybercriminals often target adults for their valuable financial and personal information, children are not exempt from these risks. This was made evident by a recent data breach involving health IT company Datavant, which exposed sensitive…
Fortinet Acquires Perception Point to Enhance AI-Driven Cybersecurity
< p style=”text-align: justify;”> Fortinet, a global leader in cybersecurity with a market valuation of approximately $75 billion, has acquired Israeli company Perception Point to bolster its email and collaboration security capabilities. While the financial terms of the deal…
Blue Yonder Cyberattack: A Wake-Up Call for Supply Chain Security
< p style=”text-align: justify;”>Blue Yonder, a prominent supply chain software provider used by major U.S. grocery chains like Safeway and Fred Meyer, is investigating a significant cyberattack. The ransomware group Termite has claimed responsibility, threatening to publish 680 gigabytes…
Misconfigured AWS Cloud Instances Lead to Sensitive Data Breaches
Misconfigured cloud instances have once again enabled cybercriminals to steal sensitive data, including credentials, API keys, and proprietary source code. This time, numerous Amazon Web Services (AWS) users fell victim, highlighting a lack of understanding regarding the shared responsibility…
The Intersection of Travel and Data Privacy: A Growing Concern
< p style=”text-align: justify;”>The evolving relationship between travel and data privacy is sparking significant debate among travellers and experts. A recent Spanish regulation requiring hotels and Airbnb hosts to collect personal guest data has particularly drawn criticism, with some…