Cybersecurity
Category Added in a WPeMatico Campaign
VMware Carbon Black’s Threat Analysis Unit (TAU) has identified dozens of previously unknown vulnerable kernel drivers that could be exploited by attackers to alter firmware or escalate privileges. It’s not uncommon for threat actors, including cybercriminals and state-sponsored groups, to abuse kernel drivers in their operations. Such drivers can allow malicious hackers to manipulate system […]
Auto Blocker prevents the installation of risky apps downloaded from outside the official app stores to protect users from malware and spyware. It also blocks unauthorized commands and software installations via the USB port.
A threat actor known as Prolific Puma has been maintaining a low profile and operating an underground link shortening service that’s offered to other threat actors for at least over the past four years. Prolific Puma creates “domain names with an RDGA [registered domain generation algorithm] and use these domains to provide a link shortening […]
The library is working with the UK’s National Cyber Security Centre (NCSC) and cybersecurity specialists to investigate the incident, but the nature of the attack and how the systems were breached are still unknown.
Digital attacks against the U.S. by Iran and non-state actors could worsen if the conflict between Israel and Hamas grows, FBI Director Christopher Wray warned on Tuesday. The “cyber targeting of American interests and critical infrastructure that we already see conducted by Iran and non-state actors alike, we can expect to get worse if the […]
Ace Hardware is currently experiencing a cyberattack that has disrupted its IT systems. While in-store payment systems and credit card processing are unaffected, online services such as placing orders are currently unavailable.
Researchers have identified an ongoing cryptojacking campaign, EleKtra-Leak, that targets exposed Identity and Access Management (IAM) credentials on GitHub repositories. The campaign has been active since December 2020, with as many as 474 unique Amazon EC2 instances found being used to mine Monero cryptocurrency between August 30 and October 6. Moreover, threat actors use these […]
85% of small business leaders say they are ready to respond to a cyber incident despite a record-high 73% reporting an attack in 2023, according to Identity Theft Resource Center. Employee and consumer data continue to be the most impacted categories of information affected by a data breach. The number of organizations reporting first-time attacks […]
A group of pro-Ukrainian hackers claims to have breached Russia’s national card payment system this week and obtained its user data. Activists from the DumpForums group and the Ukrainian Cyber Alliance said they defaced a website of the government-run National Payment Card System (NSPK) and reportedly gained access to the internal systems of the consumer […]