Cybersecurity Risks Rise as Vulnerable IoMT Devices Dominate Healthcare Networks
A recent analysis reveals that 89% of healthcare organizations use IoMT devices with known vulnerabilities, posing significant risks to patient safety and operational continuity.
View full story…
Latest Cybernews
FamousSparrow Hacking Group Resurfaces with Enhanced Malware Arsenal
The China-aligned hacking group FamousSparrow has re-emerged with upgraded malware capabilities, including the use of the ShadowPad backdoor, targeting various sectors worldwide after a period of inactivity.
View full story…
Web Application Firewalls Enhance Security for AWS Amplify Hosting
Web Application Firewalls (WAFs) provide crucial protection against cyber threats like SQL injection, XSS, and DDoS attacks for applications hosted on AWS Amplify, enabling users to implement managed and custom security rules.
View full story…
PJobRAT Malware Targets Users in Taiwan Through Spoofed Messaging Apps
A sophisticated cyber-espionage campaign utilizing the PJobRAT Android remote access trojan has been detected, targeting users in Taiwan via deceptive instant messaging applications.
View full story…
Latest Cybernews
Malware Campaign Targets npm Repository with Malicious Packages
A recent malware campaign has been identified that targets the npm package repository using malicious packages “ethers-provider2” and “ethers-providerz” to execute multi-stage attacks and create backdoors on infected systems.
View full story…
UK Government Unveils Expanded Fraud Strategy
The UK government is set to announce an expanded fraud strategy aimed at enhancing protections against the rising threat of fraud and cybercrime, which has surged by 19% annually and now constitutes a significant portion of online criminal activity.
View full story…
ETSI Launches Covercrypt, A Quantum-Safe Encryption Library
The European Telecommunications Standards Institute has introduced Covercrypt, a quantum-safe encryption library developed by Cosmian, aimed at protecting sensitive data against current and future quantum threats.
View full story…
Web Application Firewalls Enhance Security Against Cyber Threats
Web Application Firewalls (WAFs) provide critical protection for websites by filtering traffic and defending against cyber threats such as SQL injection, cross-site scripting, and DDoS attacks, with new features in AWS Amplify Hosting allowing for managed and custom rules to further strengthen security.
View full story…
Surge in Cyber-Attacks Through Third-Party Vulnerabilities in 2024
Cyber-attacks exploiting third-party vulnerabilities have risen to 35.5% of global breaches in 2024, with ransomware attacks, particularly from the Clop group, accounting for 41.4% of these incidents.
View full story…
Phishing Attacks Exploit Trusted Document Platforms for Credential Theft
Phishing campaigns are increasingly targeting trusted online document platforms like Dropbox, Adobe, and DocuSign to bypass secure email gateways and steal user credentials, with sophisticated tactics including the use of generative AI and brand impersonation.
View full story…
Latest Cybernews
Fraudsters Impersonate Clop Ransomware Gang to Extort Businesses
Fraudsters are exploiting vulnerabilities in managed file transfer software to impersonate the Clop ransomware gang and deceive organizations into paying ransoms by falsely claiming data theft.
View full story…
Rostislav Panev Extradited to U.S. for Role in LockBit Ransomware Group
Rostislav Panev, a dual citizen of Russia and Israel, has been extradited to the United States to face charges related to his involvement as a key developer in the LockBit ransomware group, which has extorted millions from thousands of victims worldwide.
View full story…