attacks
-
Blog
Microsoft Defender will isolate undiscovered endpoints to block attacks
Microsoft is testing a new Defender for Endpoint capability that will block traffic to and from undiscovered endpoints to thwart attackers’ lateral network movement attempts. As the company revealed earlier this week, this is achieved by containing the IP addresses of devices that have yet to be discovered or onboarded to Defender for Endpoint. Redmond says the new feature will…
Read More » -
Blog
Cyber attacks against UK firms dropped by 10% last year, but experts say don’t get complacent
More than four-in-ten UK businesses were hit by a cyber attack last year, marking a decrease on the year prior – but security experts have warned enterprises to still remain vigilant. The government’s latest Cybersecurity Data Breaches Survey revealed that 43% of businesses were affected, with a total of 612,000 cyber attacks or breaches recorded across the year. That’s noticeably…
Read More » -
Blog
Foreign AI model launches may have improved trust in US AI developers, says Mandiant CTO – as he warns Chinese cyber attacks are at an “unprecedented level”
Concerns about enterprise AI deployments have faded due to greater understanding of the technology and negative examples in the international community, according to Mandiant CTO Charles Carmakal. In conversation with ITPro at Google Cloud Next 2025, Carmakal said attitudes among firms who may have been hesitant to adopt the technology are changing rapidly. This process of coming around to AI,…
Read More » -
Blog
OpenAI countersues Elon Musk to stop his attacks and ‘fake takeover bid’
OpenAI filed a countersuit against Elon Musk on Wednesday, saying on X that “Elon’s nonstop actions against us are just bad-faith tactics to slow down OpenAI and seize control of the leading AI innovations for his personal benefit.” In the lawsuit, OpenAI’s lawyers argue that “Musk’s continued attacks on OpenAI, culminating most recently in the fake takeover bid designed to…
Read More » -
Blog
This potent malware variant can hijack your Windows PC, steal passwords, and more: Neptune RAT is spreading on GitHub, Telegram, and even YouTube – and experts warn ‘anyone could use it to launch attacks’
A new version of the Neptune RAT malware has emerged, security researchers have warned, and is spreading on GitHub, Telegram, and even YouTube. The remote access trojan is ‘an extremely serious threat’ being offered on the ransomware-as-a-service model, according to researchers at Cyfirma. Affecting Windows devices, it hijacks Chromium-based browsers including Chrome, Brave, and Opera using a Chromium.dll attack that…
Read More » -
Blog
Australian pension funds slammed for ‘absolute incompetence’ in wake of cyber attacks
Hackers have targeted the Association of Superannuation Funds of Australia (ASFA), compromising data and leaving several member companies out of pocket. While most of the attackers’ attempts to breach a number of superannuation funds were unsuccessful, several companies were affected and are said to have lost around $500,000 between them in what’s believed to have been a credential stuffing attack.…
Read More » -
Blog
Australian pension funds hit by wave of credential stuffing attacks
Over the weekend, a massive wave of credential stuffing attacks hit multiple large Australian super funds, compromising thousands of members’ accounts. The Association of Superannuation Funds of Australia (ASFA), Australia’s advocacy body for the superannuation industry, said today that “a number of members were affected” even though the “majority of the attempts were repelled.” Reuters has learned from a source…
Read More » -
Blog
DDoS Attacks Now Key Weapons in Geopolitical Conflicts, NETSCOUT Warns
Image: EV_Korobov/Adobe Stock Cyberattacks aren’t just about stealing data anymore — they’ve evolved into a key weapon in geopolitical fights, crippling vital infrastructure, and shaking public trust in governments. A new report by NETSCOUT reveals that hackers are increasingly using Distributed Denial of Service (DDoS) attacks to disrupt elections, protests, and policy debates, turning digital sabotage into a tool of…
Read More » -
Blog
Phishing platform ‘Lucid’ behind wave of iOS, Android SMS attacks
A phishing-as-a-service (PhaaS) platform named ‘Lucid’ has been targeting 169 entities in 88 countries using well-crafted messages sent on iMessage (iOS) and RCS (Android). Lucid, which has been operated by Chinese cybercriminals known as the ‘XinXin group’ since mid-2023, is sold to other threat actors via a subscription-based model that gives them access to over 1,000 phishing domains, tailored auto-generated…
Read More » -
Blog
Chinese FamousSparrow hackers deploy upgraded malware in attacks
A China-linked cyberespionage group known as ‘FamousSparrow’ was observed using a new modular version of its signature backdoor ‘SparrowDoor’ against a US-based trade organization. The activity and new malware version were observed by security researchers at ESET, who found evidence the threat actor has been more active than initially thought since its last operations were exposed in 2022. Apart from the financial…
Read More »