Cybersecurity

New Red Ransomware Group (Red CryptoApp) Exposes Victims on Wall of Shame

Cybersecurity researchers at Netenrich have uncovered a new ransomware group called Red Ransomware Group (Red CryptoApp). This group operates differently from typical ransomware outfits, adding a twist to their extortion tactics. Unlike most ransomware groups that keep their operations under wraps, Red CryptoApp appears to be taking an aggressive approach. According to Netenrich, the group […]

Cybersecurity

Vietnamese Threat Actor Targeting Financial Data Across Asia

Cybercrime , Fraud Management & Cybercrime CoralRaider Looks for Social Media Accounts That Contain Payment Information Mihir Bagwe (MihirBagwe) • April 5, 2024     Cisco Talos traced the IP address of CoralRaider, financially motivated hackers, to Hanoi, Vietnam, pictured. (Image: Shutterstock) Vietnamese financially motivated hackers are targeting businesses across Asia in a campaign to […]

Cybersecurity

AI-as-a-Service Providers Vulnerable to PrivEsc and Cross-Tenant Attacks

Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that could allow threat actors to escalate privileges, gain cross-tenant access to other customers’ models, and even take over the continuous integration and continuous deployment (CI/CD) pipelines. “Malicious […]

Cybersecurity

CISO Perspectives on Complying with Cybersecurity Regulations

Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the specificity of the security controls, policies, and activities they include. For CISOs and their teams, that means compliance is a time-consuming, high-stakes process that demands strong organizational and communication skills on top […]