South St. Paul Public Schools recently alerted families to ongoing technology disruption, shedding light on potential disruptions to online platforms, emails, and other digital services. In a note on Monday, the district acknowledged technical difficulties and later revealed the presence of “unautho…
Category: Cyber Attack
TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is geared towards pilfering the ha…
Microsoft has confirmed a new, significant intrusion by the persistent Russia-based hacking group Midnight Blizzard (NOBELIUM). The threat actors leveraged information exfiltrated during a January cyberattack to gain recent, unauthorized access to Microsoftโs internal network, including source code…
Chinese national Linwei Ding is accused of pilfering more than 500 files containing Google IP while affiliating with two China-based startups at the same time.
A team of researchers has developed a self-replicating computer worm designed to target AI-powered applications like Gemini Pro, ChatGPT 4.0, and LLaVA. The aim of this project was to showcase the vulnerabilities in AI-enabled systems, particularly how interconnections between generative-AI platform…
The increasing prevalence of programmable logic controllers (PLCs) featuring embedded web servers has opened avenues for potential catastrophic remote attacks on operational technology (OT) within industrial control systems (ICS) in critical infrastructure sectors. Researchers from the Georgia…
HP announced on Thursday that several of its business PCs now benefit from protection against quantum computer attacks thanks to a new security chip. The tech giant said the 5th generation of its Endpoint Security Controller (ESC) chip, which is built into some of its computers, can protect the inte…
In the realm of cybersecurity, the stakes are sky-high, and at its core lies secrets management โ the foundational pillar upon which your security infrastructure rests. We’re all familiar with the routine: safeguarding those API keys, connection strings, and certificates is non-negotiable. However, let’s dispense with the pleasantries; this isn’t a simple ‘set it and forget it’ scenario. It’s
The National Cyber Security Centre (NCSC) published a data analysis report on the data breach resulting from the ransomware attack on the IT services provider Xplain. The attack took place on May 23, 2023 and the Play ransomware gang claimed responsibility for the data breach.
In early June, Swiss police launched an…
PRESS RELEASESINGAPORE – 29th February 2024 โ In the modern age, large companies are wrestling to leverage their customersโ data to provide ever-better AI-enhanced experiences but a key barrier to leveraging this opportunity is mounting public concern around data privacy, as ever-greater data proces…
Cyber risk quantification brings together the CISO’s technical expertise and the CFO’s focus on financial impact to develop a stronger and better understanding of cyber risk.
Change Healthcare breachThere is evidence that the ransomware group behind the Change Healthcare breach, which has caused chaos for hospitals and pharmacies attempting to handle prescriptions, may have received $22 million from UnitedHealth Group.Researchers studying security issues discovered a pos…
The FBIโs Internet Crime Complaint Center (IC3) has published its annual report for 2023, which reveals that the number of cybercrime complaints received by the agency increased by nearly 10% compared to the previous year. Cybercrime victims in the United States filed more than 880,000 complaints wi…
Cisco on Wednesday announced patches for two high-severity vulnerabilities in Secure Client, the enterprise VPN application that also incorporates security and monitoring capabilities. The first issue, tracked as CVE-2024-20337, impacts the Linux, macOS, and Windows versions of Secure Client and cou…
In a recent development, American Express has issued a warning to its customers regarding a potential data breach originating from a third-party merchant processor. Although the breach did not directly involve American Express systems, the credit card data of several Card Members may have been compr…