As a result of Proofpoint researchers’ research, in August 2024, they discovered an unusual campaign in which custom malware was being delivered by a novel attack chain. Cybercriminals are believed to have named the malware “Voldemort” based on the…
Tag: CySecurity News – Latest Information Security and Hacking Incidents
Three Major Issues Family Offices Face With Private Market Data
Simply accumulating more data in a family office does not directly translate into better decision-making. Without the necessary tools and mechanisms in place to process this information, it might have the opposite effect. It’s no secret that many family…
Choosing the Right Browser: Privacy Tips from Apple and Google
Apple has launched an ad campaign urging over a billion iPhone users to stop using Google Chrome, citing privacy concerns. This campaign has sparked a heated debate between two tech giants, Apple and Google, over the best way to protect…
Project Strawberry: Advancing AI with Q-learning, A* Algorithms, and Dual-Process Theory
Project Strawberry, initially known as Q*, has quickly become a focal point of excitement and discussion within the AI community. The project aims to revolutionize artificial intelligence by enhancing its self-learning and reasoning capabilities, crucial steps toward achieving Artificial General…
Chinese Hackers Exploit Serious Flaw in Versa SD-WAN Systems
A Chinese cyber-espionage group, known as Volt Typhoon, has been exploiting a newly discovered security flaw in Versa Networks’ SD-WAN Director servers. This zero-day vulnerability, identified as CVE-2024-39717, has already been used to infiltrate several organizations. Given the seriousness…
Bling Libra Shifts Focus to Extortion in Cloud-Based Attacks
It was observed during an incident response engagement handled by Unit 42, that the threat actor group Bling Libra (which was responsible for distributing ShinyHunters ransomware) had shifted from extortion to extortion of victims rather than its traditional tactic…
The Dual Nature of Telegram: From Protest Tool to Platform for Criminal Activity
Telegram, a messaging app co-founded by Pavel Durov in 2013, has become one of the world’s largest communication platforms, with over 900 million users. The app’s dual nature has recently put it in the spotlight after Durov was arrested…
Private Data of 950K Users Stolen in BlackSuit Ransomware Attack
On April 10, 2024, a BlackSuit ransomware assault disclosed 954,177 personally identifiable information, forcing Young Consulting to send out data breach notifications. Young Consulting (formerly Connexure) is an Atlanta-based software solutions provider that specialises in the employer stop-loss marketplace.…
Enhancing EU Cybersecurity: Key Takeaways from the NIS2 Directive
The European Union has taken a significant step forward with the introduction of the NIS2 Directive. This directive, which builds upon the original Network and Information Systems (NIS) Directive, aims to bolster cybersecurity across the EU by imposing stricter requirements…
Top Travel Scams to Watch Out For: Protect Your Vacation from Common Fraud Schemes
Travel scams can turn a well-deserved vacation into a stressful ordeal, with numerous ways for scammers to exploit unsuspecting tourists. These scams have been around for years, but advancements in technology have made them more prevalent and sophisticated. According…