Newsroom

The latest cybersecurity news from around the globe

Secure by Design: A Primer

Secure by Design: A Primer

Secure by Design is one of the most popular development methodologies used today because it ensures that data privacy and cybersecurity are integrated into every step of the development lifecycle. Secure by Design is a software and hardware development methodology...

Over 130,000 Solar Panel Installations Exposed Online

Over 130,000 Solar Panel Installations Exposed Online

Based on recent reports from Cyble, there has been a large attack vector for threat actors in the Solar industry’s PV (Photo-Voltaic) diagnostic and monitoring systems. These systems are used to measure efficiency, detect faults, and optimize overall operations. The...

Hackers Use Weaponized OpenSSH Tool to Hijack Linux Systems

Hackers Use Weaponized OpenSSH Tool to Hijack Linux Systems

Cybersecurity researchers at Microsoft recently found an attack targeting Linux-based systems and IoT devices. It has been identified that the exploit employs custom and open-source tools to gain control of the impacted devices and install cryptomining malware on them...

New Stealer-as-a-Ransomware Delivered Through Fake Updates

New Stealer-as-a-Ransomware Delivered Through Fake Updates

Recently, the cybersecurity analysts at Zscaler found a new variant of malware, RedEnergy, a new hybrid Stealer-as-a-Ransomware threat. RedEnergy stealer targets industries through fake updates, stealing data from browsers, exfiltrating sensitive information, and...

China’s cyber assault on Taiwan

China’s cyber assault on Taiwan

"We are already at war," Kitsch Yen-Fan, assistant director for the Global China Hub at the Atlantic Council, told 60 Minutes. "This is a constant thing." Read the full article by Brit McCandless Farmer at 60 Minutes

Russian National Arrested For Launching LockBit Ransomware Attacks

Russian National Arrested For Launching LockBit Ransomware Attacks

LockBit has become the most reputable ransomware group in recent times. The method by which they operate differs from other ransomware groups. LockBit recruits people as affiliates for deploying ransomware inside organizations. The U.S. Department of Justice announced...

GobRAT Malware Attacking Linux Routers to Deploy Backdoor

GobRAT Malware Attacking Linux Routers to Deploy Backdoor

After an internet-exposed router is compromised, a loader script is deployed to deliver GobRAT, which disguises itself as the Apache daemon process (apached) to avoid being detected. The post GobRAT Malware Attacking Linux Routers to Deploy Backdoor appeared first on...

COSMICENERGY – New OT Malware Causes Electric Power Disruption

COSMICENERGY – New OT Malware Causes Electric Power Disruption

COSMICENERGY is a unique tool developed by a contractor for power disruption exercises. This malware shows that developing offensive OT capabilities is becoming easier as attackers learn from previous attacks. The post COSMICENERGY – New OT Malware Causes Electric...

IT Security Analyst Pleaded Guilty for Attacking his Own Company

IT Security Analyst Pleaded Guilty for Attacking his Own Company

The insider threat has been a significant concern for organizations in terms of security. Though they do not happen very often, it is still a major threat to the business.  Ashley Liles, a 28-year-old IT Security Analyst working at Oxford BioMedica, was tasked...

Stop Blaming the End User for Security Risk

Stop Blaming the End User for Security Risk

Don't count on securing end users for system security. Instead, focus on better securing the systems — make them closed by default and build with a security-first approach. Read the full article by John A. Smith at DARKReading

How the Global Spyware Industry Spiraled Out of Control

How the Global Spyware Industry Spiraled Out of Control

The market for commercial spyware — which allows governments to invade mobile phones and vacuum up data — is booming. Read the full article by Mark Mazzetti, Ronen Bergman and Matina Stevis-Gridneff at The New York Times