Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of ...
Read More »Yearly Archives: 2024
NetApp’s 2024 data complexity report reveals AI’s make or break year ahead – ET CISO
NetApp’s 2024 data complexity report reveals AI’s make or break year ahead – ET CISO https://etimg.etb2bimg.com/thumb/msid-116276896,imgsize-9624,width-1200,height=765,overlay-etciso/cybercrime-fraud/netapps-2024-data-complexity-report-reveals-ais-make-or-break-year-ahead.jpg NetApp®, the intelligent data infrastructure company, today released its second annual Data Complexity Report, which examines how global organisations are navigating the increasing complexity of managing their data for AI. This year’s report provides a global view into how AI will impact organisations in ...
Read More »Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action https://firewall.firm.in/wp-content/uploads/2024/12/badbox.png Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed ...
Read More »How to protect your communications through encryption – ET CISO
How to protect your communications through encryption – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277027,imgsize-49844,width-1200,height=765,overlay-etciso/corporate/how-to-protect-your-communications-through-encryption.jpg After a sprawling hacking campaign exposed the communications of an unknown number of Americans, US cybersecurity officials are advising people to use encryption in their communications. To safeguard against the risks highlighted by the campaign, which originated in China, federal cybersecurity authorities released an extensive list of security recommendations ...
Read More »How to Generate a CrowdStrike RFM Report With AI in Tines
How to Generate a CrowdStrike RFM Report With AI in Tines https://firewall.firm.in/wp-content/uploads/2024/12/main.png Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual “You Did What with ...
Read More »90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO
90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277183,imgsize-1234100,width-1200,height=765,overlay-etciso/corporate/90-of-indian-enterprises-agreed-that-cloud-transformation-is-fuelling-ai-adoption-ey-india.jpg AI-generated representative image Indian businesses are embracing cloud transformation as a critical enabler of AI adoption, according to the Indian findings of EY’s Global Cloud Implementation Study. With 90% of organizations affirming that AI adoption would not have been possible without cloud ...
Read More »Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms https://firewall.firm.in/wp-content/uploads/2024/12/exploit.png Dec 13, 2024The Hacker NewsIoT Security / Operational Technology Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to ...
Read More »RBI policy acts big on banking frauds: New AI tool MuleHunter.ai by RBI to help reduce digital frauds – ET CISO
RBI policy acts big on banking frauds: New AI tool MuleHunter.ai by RBI to help reduce digital frauds – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277484,imgsize-41924,width-1200,height=765,overlay-etciso/cybercrime-fraud/rbi-policy-acts-big-on-banking-frauds-new-ai-tool-mulehunter-ai-by-rbi-to-help-reduce-digital-frauds.jpg An innovative artificial intelligence based model called the ‘Mule Hunter.ai’ has been developed by the Reserve Bank innovation hub in Bengaluru. Governor Shaktikanta Das said that this new AI based system will help banks in reducing instances of ...
Read More »Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection https://firewall.firm.in/wp-content/uploads/2024/12/openwrt.png Dec 13, 2024The Hacker NewsLinux / Vulnerability A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating ...
Read More »Digital Arrest Scams: Be cautious if callers claim to be govt officials and threaten with urgent legal action – ET CISO
Digital Arrest Scams: Be cautious if callers claim to be govt officials and threaten with urgent legal action – ET CISO https://etimg.etb2bimg.com/thumb/msid-116288782,imgsize-38754,width-1200,height=765,overlay-etciso/cybercrime-fraud/digital-arrest-scams-be-cautious-if-callers-claim-to-be-govt-officials-and-threaten-with-urgent-legal-action.jpg Digital payments are now accessible nationwide, driving India towards a digital-first economy. They offer both security and convenience. However, it’s crucial to use digital payments safely and avoid online scams. Early identification of potential scams helps protect you ...
Read More »