Secure by Design is one of the most popular development methodologies used today because it ensures that data privacy and cybersecurity are integrated into every step of the development lifecycle. Secure by Design is a software and hardware development methodology...
Newsroom
The latest cybersecurity news from around the globe
Filter: All | QD5 Articles | Quantum Computing | Artificial Intelligence | Cybersecurity | Encryption
Over 130,000 Solar Panel Installations Exposed Online
Based on recent reports from Cyble, there has been a large attack vector for threat actors in the Solar industry’s PV (Photo-Voltaic) diagnostic and monitoring systems. These systems are used to measure efficiency, detect faults, and optimize overall operations. The...
JokerSpy – Multi-Stage macOS Malware Attacking Organisation Worldwide
MacOS is reported to be one of the most security Operating Systems. As of the beginning of 2023, there are over 100 million macOS devices worldwide. Due to its popularity, threat actors have begun to target macOS devices recently. Based on the recent reports from...
Hackers Use Weaponized OpenSSH Tool to Hijack Linux Systems
Cybersecurity researchers at Microsoft recently found an attack targeting Linux-based systems and IoT devices. It has been identified that the exploit employs custom and open-source tools to gain control of the impacted devices and install cryptomining malware on them...
New PoC Exploit Published for Cisco AnyConnect Flaw Granting System Privileges
Many organizations worldwide have used Cisco AnyConnect VPNs due to their security and other great features. Cisco has many products for VPN depending upon the platforms with various versions of Software. Cisco has released a new security advisory that patches a...
New Stealer-as-a-Ransomware Delivered Through Fake Updates
Recently, the cybersecurity analysts at Zscaler found a new variant of malware, RedEnergy, a new hybrid Stealer-as-a-Ransomware threat. RedEnergy stealer targets industries through fake updates, stealing data from browsers, exfiltrating sensitive information, and...
Hackers Compromised the Roundcube Email Servers of Ukrainian organizations
APT28 (aka BlueDelta, Fancy Bear, Sednit, and Sofacy), a threat group connected to Russia’s GRU, hacked the Roundcube email servers of over 40 Ukrainian organizations, including government bodies. The cyber-espionage group used news about the Russia-Ukraine conflict...
China’s cyber assault on Taiwan
"We are already at war," Kitsch Yen-Fan, assistant director for the Global China Hub at the Atlantic Council, told 60 Minutes. "This is a constant thing." Read the full article by Brit McCandless Farmer at 60 Minutes
Russian National Arrested For Launching LockBit Ransomware Attacks
LockBit has become the most reputable ransomware group in recent times. The method by which they operate differs from other ransomware groups. LockBit recruits people as affiliates for deploying ransomware inside organizations. The U.S. Department of Justice announced...
Exclusive: US government agencies hit in global cyberattack
The US Cybersecurity and Infrastructure Security Agency “is providing support to several federal agencies that have experienced intrusions affecting their MOVEit applications” Read the full article by Sean Lyngaas at CNN
Lessons From The 1,802 Data Breaches Of 2022: A Deeper Dive Into Internet Safety
The year 2022 has been a wake-up call for the digital world. A staggering 1,802 data compromises were reported globally, affecting 422 million individuals, emphasizing the urgent need to ramp up online security measures. These breaches served as a harsh reminder that...
US govt banned NSO’s Pegasus, but said to buy rival spyware Paragon Graphite
The US government banned the use of NSO’s Pegasus spyware 18 months ago, but a new report today says that at least one government agency is using very similar malware from a rival company: Paragon Graphite. Read the full article by Ben Lovejoy at 9to5Mac
The great CISO resignation: Why security leaders are quitting in droves
With ransomware becoming increasingly commoditized and generative AI tools like ChatGPT broadening hackers’ arsenal, organizations are increasingly under attack in what some are calling a cyber cold war. Read the full article by Taryn Plumb at...
GobRAT Malware Attacking Linux Routers to Deploy Backdoor
After an internet-exposed router is compromised, a loader script is deployed to deliver GobRAT, which disguises itself as the Apache daemon process (apached) to avoid being detected. The post GobRAT Malware Attacking Linux Routers to Deploy Backdoor appeared first on...
What is Zero-Trust? – How Does It Protect Your Enterprise From Cyber Attacks?
Traditional perimeter-based security measures must be upgraded in an increasingly interconnected digital ecosystem where the frequency and sophistication of cyber attacks are increasing. Enterprises face the burden of protecting sensitive data and vital systems from...
COSMICENERGY – New OT Malware Causes Electric Power Disruption
COSMICENERGY is a unique tool developed by a contractor for power disruption exercises. This malware shows that developing offensive OT capabilities is becoming easier as attackers learn from previous attacks. The post COSMICENERGY – New OT Malware Causes Electric...
Critical OAuth Framework Flaw Let Attackers Hijack Accounts & Steal Sensitive Data
OAuth Flaw in Expo Platform affects hundreds of Third-Party sites, apps. An attacker can exploit this vulnerability in the expo framework by sending a malicious link to a victim. The post Critical OAuth Framework Flaw Let Attackers Hijack Accounts & Steal...
IT Security Analyst Pleaded Guilty for Attacking his Own Company
The insider threat has been a significant concern for organizations in terms of security. Though they do not happen very often, it is still a major threat to the business. Ashley Liles, a 28-year-old IT Security Analyst working at Oxford BioMedica, was tasked...
ODNI’s Adele Merritt Highlights 5 Key Intelligence Community Priorities for 2023
“While our community is excited about all the benefits, opportunities and capabilities that operating in a multi-cloud environment bring, we are also concerned about the additional cybersecurity risks,” Merritt added. Read the full article by Ireland Degges at...
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics
Russian program aims to control internet and spread disinformation Read the full article by Luke Harding, Stiliyana Simeonova, Manisha Ganguly and Dan Sabbagh
Stop Blaming the End User for Security Risk
Don't count on securing end users for system security. Instead, focus on better securing the systems — make them closed by default and build with a security-first approach. Read the full article by John A. Smith at DARKReading
How the Global Spyware Industry Spiraled Out of Control
The market for commercial spyware — which allows governments to invade mobile phones and vacuum up data — is booming. Read the full article by Mark Mazzetti, Ronen Bergman and Matina Stevis-Gridneff at The New York Times