Category: CSO Online
-
How cybersecurity teams should prepare for geopolitical crisis spillover
From Russia’s invasion of Ukraine to Hamas’s recent assault on Israel, it’s difficult to deny that geopolitical crises come with diversifying cybersecurity footprints. In Ukraine, early digital Russian actions in support of the invasion struck not just government targets, but also satellite operators, media firms, and manufacturing companies. Over nearly two years, the cyber dimensions…
-
P2Pinfect Redis worm targets IoT with version for MIPS devices
The gang behind a cloud botnet known for targeting servers running the Redis in-memory storage system dubbed P2Pinfect is now looking to expand into the IoT ecosystem, according to a new report. Researchers have recently come across a variant of the P2Pinfect worm designed to run on Linux devices with MIPS processors. “It’s highly likely…
-
Hackers book profit by scamming Booking.com customers
Scamsters are found to be using a range of techniques including phishing, infostealers, and social engineering to cheat several customers of Booking.com, as per an investigation carried out by cybersecurity firm SecureWorks. Booking.com customers from the UK, Indonesia, Singapore, Greece, Italy, Portugal, the US, and the Netherlands, have been impacted, according to a BBC report.…
-
Proactive, not reactive: the path to ensuring operational resilience in cybersecurity
From bank robbers in the Wild West to ransomware-as-a-service (RaaS), threats to the world’s financial ecosystem have evolved significantly over the years. Technological advancements have led to the rapid evolution of the financial industry, from cash transactions to digital wallets, embedded finance, and open banking. But they have also democratized sophisticated technology tools, making them…
-
4 budget-savvy strategies for building an effective purple team
Purple teams are like the unicorns of cybersecurity, mixing the best of offense and defense. Think of them as the all-stars who play both sides of the game, finding the weak spots and beefing up the security where it counts. But let’s be real — not everyone’s got the big bucks to put together the…
-
Is China waging a cyber war with Taiwan?
With geopolitical tensions and a trade war acting as a backdrop, China-led cyberattacks on Taiwan are rising sharply, according to multiple security reports. In the latest report about alleged China-sponsored cyberattacks on Taiwan, Kate Morgan, a senior engineering manager in Google’s Threat Analysis Division, told Bloomberg that Google is tracking close to 100 hacking groups…
-
Apple patches info-stealing, zero day bugs in iPads and Macs
Apple has released patches for a couple of security issues found within its Webkit web browser engine that the iPhone maker believes have had zero day exploitations. Tracking them as CVE-2023-42916, and CVE-2023-42917, Apple said these vulnerabilities can be exploited while processing web content to leak sensitive information and execute arbitrary codes, respectively. “Apple is…
-
Conti-linked ransomware takes in $107 million in ransoms: Report
Black Basta, a ransomware campaign thought to be the brainchild of people linked to the infamous Conti malware gang, has been paid more than $100 million in the past year and a half, infecting 329 known victims. According to a report published this week by blockchain analytics firm Elliptic, the Black Basta ransomware has attacked…
-
Okta confirms recent hack affected all customers within the affected system
Identity and access management company, Okta, has revealed last month’s security incident within its support case management system has affected all users, contrary to earlier reports of it compromising the data of only one percent of users. In a November 21 update on the incident, David Bradbury, chief security officer at Okta confirmed that a…
-
How to maintain a solid cybersecurity posture during a natural disaster
It’s common knowledge that natural disasters are increasingly threatening more and more of the world and in places that were once thought of as safe from the ravages of nature. According to the US National Oceanic and Atmospheric Administration, there were 25 billion-dollar-plus climate-related disasters in the US alone in the first 10 months of…
-
Attackers could abuse Google’s SSO integration with Windows for lateral movement
Attackers are always looking for new ways to expand their access inside corporate networks once they hack into a machine or a user account. Recent research by security firm Bitdefender shows how attackers can gain access to Google Workspace and Google Cloud services by stealing access tokens and even plaintext passwords from compromised Windows systems…
-
Amazon debuts biometric security device, updates Detective and GuardDuty
The latest security announcements from Amazon aim to address a wide range of security issues for businesses, including an all-in-one hand-scanning biometric system and new capabilities for its Detective security visualization tool and GuardDuty continuous monitoring solution. Amazon One Enterprise is the most novel of the company’s announcements, which were made this week at its…