Hong Kong bars services like WhatsApp and Google Drive from government computers, ET CISO The Hong Kong government is barring most civil servants from using popular apps like WhatsApp, WeChat and Google Drive on their work computers due to potential security risks. The latest IT security guidelines from the Digital Policy Office have many civil servants complaining about added inconvenience. ...
Read More »Yearly Archives: 2024
New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection
New Grandoreiro Banking Malware Variants Emerge with Advanced Tactics to Evade Detection https://firewall.firm.in/wp-content/uploads/2024/10/trojan.png New variants of a banking malware called Grandoreiro have been found to adopt new tactics in an effort to bypass anti-fraud measures, indicating that the malicious software is continuing to be actively developed despite law enforcement efforts to crack down on the operation. “Only part of this ...
Read More »Rise of cyberattacks targeting reputations – ET CISO
Rise of cyberattacks targeting reputations – ET CISO https://etimg.etb2bimg.com/thumb/msid-114492449,imgsize-469972,width-1200,height=765,overlay-etciso/ot-security/rise-of-cyberattacks-targeting-reputations.jpg Cybercriminals are expanding their tactics beyond ransomware. They are now manipulating narratives and deploying disinformation. This strategy aims to destabilise organisations and tarnish reputations. Take the recent case involving a leading insurance firm. A typical data breach? Not quite. This one goes much deeper. It’s not just a story of stolen ...
Read More »How to rebuild trust after a cybersecurity breach?, IT Security News, ET CISO
How to rebuild trust after a cybersecurity breach?, IT Security News, ET CISO Bob Huber, Chief Security Officer and Head of Research, Tenable AI innovation and adoption are rapidly advancing in India and globally. Yet, at this peak of technological progress, trust in institutions is waning. A recent study by Edelman reveals that 39% of people are twice as likely ...
Read More »Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans
Gophish Framework Used in Phishing Campaigns to Deploy Remote Access Trojans https://firewall.firm.in/wp-content/uploads/2024/10/cisco.png Russian-speaking users have become the target of a new phishing campaign that leverages an open-source phishing toolkit called Gophish to deliver DarkCrystal RAT (aka DCRat) and a previously undocumented remote access trojan dubbed PowerRAT. “The campaign involves modular infection chains that are either Maldoc or HTML-based infections and ...
Read More »Facebook owner Meta restarts facial recognition tech in ‘celeb-bait’ crackdown – ET CISO
Facebook owner Meta restarts facial recognition tech in ‘celeb-bait’ crackdown – ET CISO https://etimg.etb2bimg.com/thumb/msid-114449553,imgsize-29960,width-1200,height=765,overlay-etciso/ot-security/facebook-owner-meta-restarts-facial-recognition-tech-in-celeb-bait-crackdown.jpg Three years after Meta shut down facial recognition software on Facebook amid a groundswell of privacy and regulator pushback, the social media giant said on Tuesday it is testing the service again as part of a crackdown on “celeb bait” scams. Meta said it will enroll ...
Read More »Guide: The Ultimate Pentest Checklist for Full-Stack Security
Guide: The Ultimate Pentest Checklist for Full-Stack Security https://firewall.firm.in/wp-content/uploads/2024/10/breacklock.jpg Oct 21, 2024The Hacker NewsPenetration Testing / API Security Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics and techniques, penetration testing checklists have become essential for ensuring thorough assessments across an organization’s attack surface, both internal and external. By ...
Read More »Fake Apple products worth more than Rs 1.4 crore seized in Ireland – ET CISO
Fake Apple products worth more than Rs 1.4 crore seized in Ireland – ET CISO https://etimg.etb2bimg.com/thumb/msid-114416492,imgsize-12644,width-1200,height=765,overlay-etciso/corporate/fake-apple-products-worth-more-than-rs-1-4-crore-seized-in-ireland.jpg 800 counterfeit Apple devices have been reportedly seized in Ireland. According to a report by Irish radio station Newstalk, the country’s police have claimed that these devices, including AirPods and iPhone accessories, worth an estimated $173,904 (more than 1.4 crores) were reportedly seized in ...
Read More »Hackers target India’s biggest brands, IT Security News, ET CISO
Hackers target India’s biggest brands, IT Security News, ET CISO Earlier this year, a leading finance company found itself in the middle of a major cybersecurity breach due to a password compromise, leading to leakage of sensitive financial information. However, the case was handled internally and hushed up, according to a person with knowledge of the matter, who did not ...
Read More »Major security breach? ‘Pentagon documents’ leaked online – ET CISO
Major security breach? ‘Pentagon documents’ leaked online – ET CISO https://etimg.etb2bimg.com/thumb/msid-114416419,imgsize-896964,width-1200,height=765,overlay-etciso/data-breaches/major-security-breach-pentagon-documents-leaked-online.jpg A pro-Iranian Telegram account has leaked alleged classified Pentagon documents that detail Israel’s preparations for a potential military strike against Tehran. The documents, published by a pro-Iran Telegram account called “Middle East Spectator,” claim to provide insights into US intelligence observations of Israeli military activities conducted on October 15-16. ...
Read More »