threat

  • Blog

    Winnti hackers target other threat actors with new Glutton PHP backdoor

    ​The Chinese Winnti hacking group is using a new PHP backdoor named ‘Glutton’ in attacks on organizations in China and the U.S., and also in attacks on other cybercriminals. Chinese security firm QAX’s XLab discovered the new PHP malware in late April 2024, but evidence of its deployment, along with other files, dates back to December 2023. XLab comments that,…

    Read More »
  • Blog

    Threat of personal liability has CISOs sweating

    CISOs are feeling the pressure over stories of their peers being held personally liable for cybersecurity incidents. In the most notorious example, the US Securities and Exchange Commission (SEC) last year announced that it was filing charges against both SolarWinds and its CISO, Tim Brown, amid allegations of “fraud and internal control failures relating to allegedly known cybersecurity risks and…

    Read More »
  • Blog

    Cloudflare’s developer domains increasingly abused by threat actors

    Cloudflare’s ‘pages.dev’ and ‘workers.dev’ domains, used for deploying web pages and facilitating serverless computing, are being increasingly abused by cybercriminals for phishing and other malicious activities. According to cybersecurity firm Fortra, the abuse of these domains has risen between 100% and 250% compared to 2023. The researchers believe the use of these domains is aimed at improving the legitimacy and effectiveness…

    Read More »
  • Blog

    UK underestimates threat from hostile states, says new NCSC head

    The UK is failing to take cyber threats seriously enough, the new head of the National Cyber Security Centre (NCSC) has warned. In his first major speech in the role, Richard Horne is warning that organizations are underestimating the risks from hostile states and cyber criminals. Speaking at the NCSC’s headquarters for the launch of its Annual Review, Horne stressed…

    Read More »
  • Blog

    Fresh warning issued over encryption-less ransomware as notorious threat group shifts tactics

    Security agencies have updated their information on notorious ransomware gang BianLian, warning the group has shifted its tactics and is moving away from encryption based attacks. A cybersecurity advisory issued by the FBI, CISA, and Australia Cyber Security Centre was recently updated on 20 November 2024 to reflect a change in tactics from the group, signaling a potentially wider shift…

    Read More »
  • Blog

    The biggest IT threat? That seemingly innocuous web browser – Computerworld

    Desktop vs. mobile. Some enterprises might need to consider standardizing on one browser for desktop and possibly a different browser for mobile.  IT political issues. Some of the browsers with major market share are deeply integrated with one vendor’s environments, such as Google Chrome and Microsoft Edge. Depending on how your environments are integrated with different platforms, this could be…

    Read More »
  • Blog

    Increasing Awareness of DNS Hijacking: A Growing Cyber Threat

    A recent report from Palo Alto Networks’s Unit 42 exposes the persistent and evolving threat of DNS hijacking, a stealthy tactic cybercriminals use to reroute internet traffic. By leveraging passive DNS analysis, the cybersecurity company also provided real-world examples of recent DNS hijacking attacks — highlighting the urgency of countering this hidden danger. What is DNS hijacking? DNS hijacking involves…

    Read More »
  • Blog

    AI-Assisted Attacks Top Cyber Threat For Third Consecutive Quarter, Gartner Finds

    For the third consecutive quarter, Gartner has found that cyber attacks staged using artificial intelligence are the biggest risk for enterprises. The consulting firm surveyed 286 senior risk and assurance executives from July through September, and 80% cited AI-enhanced malicious attacks as the top threat they were concerned about. This isn’t surprising, as evidence suggests AI-assisted attacks are on the…

    Read More »
  • Blog

    Threat Actors Are Exploiting Vulnerabilities Faster Than Ever

    New research by cybersecurity firm Mandiant provides eyebrow-raising statistics on the exploitation of vulnerabilities by attackers, based on the analysis of 138 different exploited vulnerabilities that were disclosed in 2023. The findings, published on Google Cloud’s blog, reveals that vendors are increasingly being targeted by attackers, who are continually reducing the average time to exploit both zero-day and N-day vulnerabilities.…

    Read More »
  • Blog

    Microsoft logs 600 million identity attacks per day as threat actors collaborate more

    Microsoft has said it tracked more than 600 million identity attacks across its 2024 fiscal year, as the firm warns cybercriminals are becoming more collaborative and focused in their attacks. In its Digital Defense Report 2024, Microsoft noted the rise of identity-based cyber attacks as firms migrate to the cloud and stated that Microsoft Entra data showed 7,000 password attacks…

    Read More »
Back to top button
close