The inner workings of AI search are more complex than simple text searching via Google when it comes to extracting answers from websites and databases. Fortanix is trying to build…
Category: Cyber Security
Ransomware and junk bank accounts: Cyber threats proliferate in Vietnam
Last month, Vietnamese broker VNDirect Cyber Systems shut down its securities trading systems and disconnected from the country’s two stock exchanges after a ransomware attack that encrypted critical data. VNDirect…
Threat actor linked to China hides via ‘peculiar’ malware.
Researchers have identified Earth Freybug, a threat actor linked to China, using a new malware tool to bypass mechanisms that organizations may have put in place to monitor Windows application…
NIST wants help getting out of its NVD backlog
After warning that it could not keep up with the exponential number of bugs submitted to the National Vulnerability Database (NVD), the National Institute of Science and Technology (NIST) has…
HHS plans for cyber one-stop shop after United Healthcare attack
The Department of Health and Human Services (HHS) has launched an initiative to better organize and equip its healthcare cybersecurity programs through a one-stop shop. This latter resource was created…
Fund organizations that protect the Internet
Much of our daily lives, from banking to turning on the lights, would be impossible if the elaborate infrastructure that powers the Internet wasn’t available. However, unlike the electric grill…
China-Linked Hackers Deploy New Malware ‘UNAPIMON’ for Stealth Operations
02 April 2024PressroomCyber espionage/threat intelligence A cluster of threat activity tracked as Terrestrial Fregibug has been observed using a new malware called UNAPIMON to fly under the radar. “Earth Freybug…
Instill the hacker mentality throughout the organization
COMMENT The saying “put yourself in a hacker’s shoes” has been part of defensive security strategies for a long time. Today, in the rapidly evolving and evolving threat landscape, this…
Malicious code in XZ Utils for Linux systems allows remote code execution
02 April 2024PressroomFirmware security/vulnerabilities Malicious code inserted into the open source library XZ Utils, a widely used package found in major Linux distributions, is also capable of facilitating remote code…
Cyber attacks that cause physical disruption are on the rise
At least 68 cyberattacks last year caused physical impacts to operational technology (OT) networks at more than 500 sites around the world, in some cases causing $10 million to $100…