Facebook and Instagram users worldwide have been logged out of the sites and are having trouble logging in, receiving errors that their passwords are incorrect. […]
Category: Cyber Security News
North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise ScreenConnect to deploy a new malware called TODDLERSHARK.
According to a report shared by Kroll with The Hacker News, TODDLERSHARK overlaps with known Kimsuky malware such as BabyShark and ReconShark.
“The threat actor gained access to the victim workstation by exploiting the exposed setup wizard
In the dynamic realm of blockchain technology, a groundbreaking innovation is emerging as a beacon of privacy and security: Zero-Knowledge Proofs (ZKPs). These cryptographic marvels are poised to redefine the landscape of blockchain transactions, offering unparalleled privacy and integrity. Let’s de…
Authorities in Delhi are cautioning residents to remain vigilant against a recent surge in cyber fraud cases known as ‘digital house arrest,’ with over 200 incidents reported monthly in the capital.Described as a serious threat by senior officials, this tactic employed by cybercriminals aims to coer…
Integrating digital technologies and increased connectivity in industrial operations heightens the risk of cybersecurity threats to Operational Technology (OT). Regulatory compliance standards and directives, such as those outlined by NIST, NIS2, ISA, and IEC, are pivotal in mitigating OT cybersecur…
Minnesota hospitals are facing financial challenges due to a recent cyberattack on a subsidiary of UnitedHealth Group, based in Minnetonka. Patient care and medication availability remain stable, but hospitals are unable to process claims for payment or estimate costs for patients due to ongoing sys…
The North Korean government-backed hackers were able to gain a major victory when Microsoft left a zero-day vulnerability unpatched for six months after learning it was actively exploited for six months. As a result of this, attackers were able to take advantage of existing vulnerabilities, thereby…
Cloudflare on Monday announced a series of new security products that leverage AI, protect AI solutions, or defend against AI-enhanced phishing. To improve its customers’ analytics abilities, Cloudflare introduced an AI assistant in the Security Analytics section of its dashboard, to help identify a…
As artificial intelligence (AI) technologies advance, researchers are voicing concerns about the possibility of AI-fueled cyber-physical attacks on critical US infrastructure. Last month, the FBI warned that Chinese hackers might impair critical sectors such as water treatment, electrical, and trans…
Axonius, a well entrenched player in the attack surface management space, has banked another $200 million in late-stage funding from a roster of major investors. The company, which has roots in Israel, described the financing as a Series E extension led by existing investors Accel and Lightspeed Ven…
Investment firm Team8 has raised $500 million in new funds, bringing its total assets under management (AUM) to over $1 billion. The Tel Aviv and New York-based company divides its activities into two separate areas: venture creation and venture capital. The first helps entrepreneurs get new ideas o…
Twenty-seven cybersecurity-related merger and acquisition (M&A) deals were announced in February 2024. An analysis conducted by SecurityWeek shows that more than 400 cybersecurity M&A deals were announced in 2023, with a drop seen in both volume and disclosed deal value. Here is…
The Düsseldorf Police in Germany have made a significant stride in the ongoing battle against cybercrime by dismantling Crimemarket, the largest cybercrime market in the country, with over 180,000 users. This illicit trading platform served as a hub for trading illegal drugs, narcotics, and cybercri…
JetBrains on Monday released patches for two authentication bypass vulnerabilities in the build management server TeamCity, including a critical-severity flaw leading to full compromise. Tracked as CVE-2024-27198 (CVSS score of 9.8) and CVE-2024-27199 (CVSS score of 7.3), the security defects impact…
A plugin for the open source network security monitoring tool Zeek is affected by several vulnerabilities that threat actors could leverage in attacks aimed at industrial control system (ICS) environments. The existence of the vulnerabilities was disclosed recently by the US security agency CISA. Th…