Updates

Ransomware Landscape Undergoes Fragmentation

Experienced cybercriminals are moving away from large ransomware-as-a-service (RaaS) platforms due to increased law enforcement actions and internal scams like the AlphV/BlackCat gang’s exit scam. These criminals are now creating their own ransomware using leaked tools. Despite the change, experts warn that ransomware and extortion incidents are unlikely to decrease. …

Read More

HHS Cloud Systems at Risk

The Department of Health and Human Services (HHS) faces significant cloud security vulnerabilities, as highlighted in a recent audit by the Office of Inspector General (OIG). The report reveals weaknesses in a dozen security controls and inadequacies in HHS’ cloud inventory processes. Critical issues include a lack of multifactor authentication …

Read More

Daolpu Malware Hits Windows Systems

CrowdStrike warns of a new malware campaign that exploits the recent Falcon update bug, leading to widespread IT outages. Cybercriminals are distributing the Daolpu information-stealing malware through phishing emails disguised as recovery instructions. Once active, Daolpu harvests account credentials, browser history, and cookies from popular web browsers, posing a significant …

Read More

SMTP Flaws Risk Email Security

Security researchers at PayPal have uncovered three new SMTP smuggling attack techniques that exploit misconfigurations and design flaws in at least 50 email-hosting providers. These techniques allow attackers to spoof emails from over 20 million trusted domains, bypassing essential security protocols like SPF, DKIM, and DMARC. As a result, malicious …

Read More

LA Courts Halted by Ransomware

Los Angeles County Superior Court, the largest trial court in America, shut down all 36 courthouses following a severe ransomware attack. The attack, which occurred on Friday, rendered every electronic platform containing court data and all internet-connected devices inoperable. Since the attack, court employees and cybersecurity experts have been tirelessly …

Read More

Indiana County Declares Cyber Disaster

Clay County, Indiana, has declared a local disaster following a ransomware attack that disrupted critical services at the county courthouse, Community Corrections, and Probation offices. The attack, discovered around midnight on July 9, prevented officials from accessing data or connecting with state partners, leading to the closure of the courthouse …

Read More

Balancing Security and Business Needs

Most businesses these days are prioritizing their security measures to safeguard their sensitive data. Some are finding it challenging to justify cybersecurity investments to stakeholders and demonstrate ROI. Investing in security solutions is essential, however, it’s also important to keep business costs in check. By conducting a proactive risk assessment organizations …

Read More

Real vs Theoretical Cybersecurity: Key Distinctions

Real life cybersecurity is different from theoretical cybersecurity

Lets explore the key differences between real-life cybersecurity and theoretical cybersecurity, with a focus on the practical approach required in the field. Key Takeaways Cybersecurity encompasses both theoretical concepts and their practical implementation. Real-life cybersecurity poses unique challenges that go beyond theoretical considerations. Developing practical strategies and soft skills is …

Read More

New SEC Cybersecurity Rules Take Effect

The Securities and Exchange Commission (SEC) has set new standards for how public companies report cybersecurity issues. These rules will significantly impact how companies report and manage cybersecurity threats, marking a pivotal moment in corporate cyber governance. Mandatory Incident Disclosure Public companies are now required to disclose material cybersecurity incidents …

Read More

Apache Alerts on High-Risk Flaw in Struts 2 Framework

The Apache Software Foundation has recently issued a critical security advisory for its widely-used Struts 2 web application framework. This alert, focused on a newly discovered vulnerability identified as CVE-2023-50164, underscores the ongoing challenges in securing web applications in an increasingly complex cyber environment. Unpacking the Vulnerability CVE-2023-50164 is more …

Read More