Yesterday, Reuters reported that multiple explosions involving communication devices used by Hezbollah resulted in at least nine deaths and over 3000 injuries across Lebanon. Among those wounded were Hezbollah fighters, medics, and Iran’s ambassador to Lebanon, Mojtaba Amani, who sustained…
Tag: Information Security Buzz
Phishing Campaigns Surge with New Header Refresh Technique, Targeting Financial and Government Sectors
In 2024, Unit 42 researchers observed a sharp increase in large-scale phishing campaigns using a novel technique involving the HTTP response header. Between May and July, they detected approximately 2,000 malicious URLs daily, which directed web browsers to refresh or…
TfL Employees Face In-Person Identity Verification Following Cyberattack
Nearly two weeks after a significant cybersecurity breach, Transport for London (TfL) announced on its employee hub that its 30,000 employees must attend in-person appointments to verify their identities and reset their passwords. This move follows a full system reset…
The Human Element in Non-Human Identity Security: Bridging the Gap in Modern Cybersecurity
In today’s cybersecurity landscape, Non-Human identities (NHIs) are exploding in number. For every human user, there may be hundreds or even thousands of NHIs running in the background. Traditional access management tools were designed primarily for human users, and they…
Hunters International Claims Breach of ICBC London
The ransomware group, Hunters International, has reportedly claimed responsibility for a breach at the London branch of the Industrial and Commercial Bank of China (ICBC), one of China’s largest state-owned banks. According to the group, they have exfiltrated 6.6 terabytes…
Researchers Discover New Variant of TrickMo Banking Trojan
Cleafy’s Threat Intelligence team has uncovered a new variant of the TrickMo Android banking Trojan. Initially classified as an unknown malware sample, deeper analysis revealed it as a TrickMo variant with some new anti-analysis features, making detection more difficult and…
New Environmental Policies and Practices Raise Unexpected Cybersecurity Challenges
Sound environmental policies are critical to protect the planet’s future. In response, companies have developed technologies and practices to help their respective industries and clients. While green innovation is necessary, the devices and systems have caused unexpected cybersecurity challenges. What…
Is Your Business Ready for the Quantum Cybersecurity Threat?
Imagine a world where even the strongest cybersecurity defenses crumble in seconds. This isn’t a sci-fi plot; it’s a looming reality with the rise of quantum computing—a technology that could revolutionize industries and dismantle current encryption methods. Quantum computing is…
Android TV Box Malware, Vo1d, Infects Over a Million Devices Worldwide
Cybersecurity experts at Doctor Web have uncovered a massive malware campaign targeting Android-based TV boxes. Dubbed Android.Vo1d, the newly discovered malware has infected nearly 1.3 million devices across 197 countries, making it one of the most widespread infections of its…
Fortinet Confirms Data Breach
Cybersecurity firm Fortinet has confirmed that user data was stolen from its Microsoft SharePoint server and posted on a hacking forum earlier today, according to a report by BleepingComputer. The threat actor, known as “Fortibitch,” shared credentials to what is…