Latest Cybernews
![Cybercriminals Exploit CrowdStrike Outage with Phishing Attacks](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_datacentre_1_cropped.jpg)
Cybercriminals Exploit CrowdStrike Outage with Phishing Attacks
Hackers target CrowdStrike customers with phishing emails disguised as Microsoft recovery guides to steal sensitive information and distribute malware.
View full story…
![Ransomware and BEC Attacks Dominate Cyber Threat Landscape in Q2 2024](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_padlock_13_cropped.jpg)
Ransomware and BEC Attacks Dominate Cyber Threat Landscape in Q2 2024
Ransomware incidents increased by 22% in Q2 2024, with compromised credentials as the most common initial access method, highlighting the need for organizations to strengthen cybersecurity measures.
View full story…
![Critical Docker Engine Vulnerability Allows Unauthorized Access](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_hacker_3_cropped.jpg)
Critical Docker Engine Vulnerability Allows Unauthorized Access
A critical security vulnerability in certain versions of Docker Engine allows attackers to bypass authorization plugins and gain unauthorized access to systems.
View full story…
![Meta Platforms Removes 63,000 Instagram Accounts in Nigeria for Financial Sextortion Scams](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_control_centre_2_cropped.jpg)
Meta Platforms Removes 63,000 Instagram Accounts in Nigeria for Financial Sextortion Scams
Meta Platforms takes action against cybercrime in Nigeria by removing accounts involved in financial sextortion scams, primarily targeting American men and minors.
View full story…
![Vulnerability ConfusedFunction Identified in Google Cloud Platform’s Cloud Functions and Cloud Build Services](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_computer_room_2_cropped.jpg)
Vulnerability ConfusedFunction Identified in Google Cloud Platform’s Cloud Functions and Cloud Build Services
A security risk has been identified in Google Cloud Platform’s Cloud Functions and Cloud Build services, allowing threat actors to escalate privileges and potentially gain unauthorized access to other GCP services.
View full story…
![Malware Attacks Surge 30% in First Half of 2024](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_server_7_cropped.jpg)
Malware Attacks Surge 30% in First Half of 2024
Malware-based threats increased significantly in the first half of 2024, with a spike in attacks using sophisticated methods like PowerShell and targeting IoT devices.
View full story…
![Global IT Outage Caused by CrowdStrike Falcon Sensor Defect](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_server_4_cropped.jpg)
Global IT Outage Caused by CrowdStrike Falcon Sensor Defect
A defect in a content update for CrowdStrike’s Falcon sensor led to a global IT outage impacting over 8.5 million computers running Windows, highlighting the critical need for effective ransomware recovery and response plans.
View full story…
![Study Reveals IT Leaders’ Concerns Over Cybersecurity Preparedness](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_android_cropped.jpg)
Study Reveals IT Leaders’ Concerns Over Cybersecurity Preparedness
A recent study by Appsbroker CTS found that IT and cybersecurity leaders feel unprepared for emerging technologies and increasing cyber threats, with many turning to Zero Trust controls to address challenges.
View full story…
![Google Chrome Enhances Download Protection Features for User Security](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_server_1_cropped.jpg)
Google Chrome Enhances Download Protection Features for User Security
Google Chrome implements new warning system for password-protected files from untrustworthy sources, leading to increased malware detection rates and reduced likelihood of falling victim to phishing scams.
View full story…
Latest Cybernews
![Cybercriminal “Stargazer Goblin” Operates Malware Network on GitHub](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_hacker_5_cropped.jpg)
Cybercriminal “Stargazer Goblin” Operates Malware Network on GitHub
Stargazer Goblin runs the Stargazers Ghost Network on GitHub, distributing malware to Windows users through fake accounts and earning up to $100,000.
View full story…
![Study Reveals IT Leaders’ Concerns Over Cybersecurity Preparedness](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_android_cropped.jpg)
CISA Adds Twilio Authy and IE Flaws to Exploited Vulnerabilities List
Two critical vulnerabilities, CVE-2012-4792 in Internet Explorer and CVE-2024-39891 in Twilio Authy, pose significant risks to organizations and individuals, with potential exploitation and data exposure threats.
View full story…
![SafeBase Introduces Trust Center Platform for Managing Security Questionnaires and Requests](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_control_centre_1_cropped.jpg)
SafeBase Introduces Trust Center Platform for Managing Security Questionnaires and Requests
SafeBase’s Trust Center platform centralizes expertise, standardizes responses, and promotes continuous improvement to streamline the security review process and reduce time and budget costs.
View full story…
![Cyberattackers Exploit Microsoft Defender SmartScreen Vulnerability for Stealer Campaign Targeting Organizations](https://nquiringminds.com/wp-content/uploads/2023/08/cybersecurity_datacentre_cropped.jpg)
Cyberattackers Exploit Microsoft Defender SmartScreen Vulnerability for Stealer Campaign Targeting Organizations
Threat actors are using a critical security bypass vulnerability in Microsoft Defender SmartScreen to launch a stealer campaign targeting organizations with outdated Windows patching.
View full story…