'

P2Pinfect Redis worm targets IoT with version for MIPS devices

P2Pinfect Redis worm targets IoT with version for MIPS devices

The gang behind a cloud botnet known for targeting servers running the Redis in-memory storage system dubbed P2Pinfect is now looking to expand into the IoT ecosystem, according to a new report. Researchers have recently come across a variant of the P2Pinfect worm designed to run on Linux devices with MIPS processors. “It’s highly likely … Read more

Hackers book profit by scamming Booking.com customers

Hackers book profit by scamming Booking.com customers

Scamsters are found to be using a range of techniques including phishing, infostealers, and social engineering to cheat several customers of Booking.com, as per an investigation carried out by cybersecurity firm SecureWorks. Booking.com customers from the UK, Indonesia, Singapore, Greece, Italy, Portugal, the US, and the Netherlands, have been impacted, according to a BBC report. … Read more

Proactive, not reactive: the path to ensuring operational resilience in cybersecurity

Proactive, not reactive: the path to ensuring operational resilience in cybersecurity

From bank robbers in the Wild West to ransomware-as-a-service (RaaS), threats to the world’s financial ecosystem have evolved significantly over the years. Technological advancements have led to the rapid evolution of the financial industry, from cash transactions to digital wallets, embedded finance, and open banking. But they have also democratized sophisticated technology tools, making them … Read more