Navigating biometric data security risks in the digital age

COMMENT Although it wasn’t called biometrics at the time, a rudimentary form of this technology emerged in 1901 when Scotland Yard has adopted fingerprint classification to identify criminal suspects. Since…

Cybercriminals using new DNS hijacking technique for investment scams

05 March 2024PressroomCybercrime/Malware Dubbed a new DNS threat actor Experienced seahorse is exploiting sophisticated techniques to lure targets into fake investment platforms and steal funds. “The Seahorse expert is a…

GhostLocker 2.0 haunts businesses in the Middle East, Africa, and Asia

Cybercriminals have developed an improved version of the infamous GhostLocker ransomware that they are employing in attacks across the Middle East, Africa and Asia. Two ransomware groups, GhostSec and Stormous,…

What is exposure management and how does it differ from ASM?

05 March 2024PressroomAttack/exposure surface management Startups and scale-ups are often cloud-first organizations and rarely have extensive legacy on-premise environments. Likewise, knowing the agility and flexibility offered by cloud environments, the…

The thread hijacking attack targets IT networks, stealing NTLM hashes

05 March 2024PressroomEmail Security/Network Security The menacing actor known as TA577 The use of ZIP archive attachments in phishing emails with the goal of stealing NT LAN Manager (NTLM) hashes…

The Middle East is a leader in implementing DMARC email security

Following stricter email management mandates from Google and Yahoo, organizations around the world have rapidly adopted three email authentication technologies, and organizations in the Middle East are adopting them just…

Amex customer data exposed to third-party breach

American Express is notifying its customers that their credit cards have been exposed in a breach involving a third-party service provider. In a data breach notification filed with the state…

Critical flaws in JetBrains TeamCity on-premise could lead to server takeovers

05 March 2024PressroomNetwork Vulnerabilities/Security A new pair of security vulnerabilities have been discovered in JetBrains TeamCity On-Premises software that could be exploited by a threat actor to take control of…

The Zero-Click GenAI worm spreads malware and poisoning patterns

A worm that uses intelligently timely engineering and injection is capable of tricking generative artificial intelligence (GenAI) apps like ChatGPT into propagating malware and more. In a lab setting, three…

Seoul spies say North Korean hackers stole semiconductor secrets

North Korean hackers allegedly stole secrets of South Korean microchip manufacturing technology, prompting Seoul’s National Intelligence Service (NIS) to call for better cyber defenses. Reports say the NIS is blamed…