Casio confirms customer data compromised in ransomware attack – ET CISO https://etimg.etb2bimg.com/thumb/msid-114273808,imgsize-92562,width-1200,height=765,overlay-etciso/cybercrime-fraud/casio-confirms-customer-data-compromised-in-ransomware-attack.jpg Japanese electronics giant Casio has confirmed that a recent ransomware attack resulted in the theft of customer data, along with sensitive employee and company information. The breach, which occurred on October 5, 2024, is the latest in a series of high-profile cyberattacks targeting major corporations this year. In ...
Read More »Author Archives: firewallfirmadmin
India ranks high in global malware and ransomware incidents, IT Security News, ET CISO
India ranks high in global malware and ransomware incidents, IT Security News, ET CISO Trend Micro recently unveiled its highly anticipated Trend Micro 2024 Midyear Cybersecurity Threat Report outlining India’s heightened cybersecurity risks. With the nation’s digital infrastructure rapidly expanding across critical sectors like Banking, Government, and Manufacturing, India now stands at the forefront of global cybersecurity challenges. The findings ...
Read More »OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf https://firewall.firm.in/wp-content/uploads/2024/10/cyberattac.png Oct 13, 2024Ravie Lakshmanan The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel as part of a cyber espionage campaign targeting the U.A.E. and the broader Gulf region. “The group utilizes sophisticated tactics that include deploying ...
Read More »Trump campaign turns to secure hardware after hacking incident – ET CISO
Trump campaign turns to secure hardware after hacking incident – ET CISO https://etimg.etb2bimg.com/thumb/msid-114165352,imgsize-55794,width-1200,height=765,overlay-etciso/ot-security/trump-campaign-turns-to-secure-hardware-after-hacking-incident.jpg Republican presidential candidate Donald Trump’s campaign is now using specialized, encrypted mobile phones and secure laptops in an effort to protect staff following a series of successful Iranian hacks and two attempts to assassinate the former president. The campaign recently purchased a package of these devices from ...
Read More »Apple researchers question AI’s reasoning ability in mathematics, ET CISO
Apple researchers question AI’s reasoning ability in mathematics, ET CISO A team of Apple researchers has questioned the formal reasoning capabilities of large language models (LLMs), particularly in mathematics. They found that LLMs exhibit noticeable variance when responding to different instantiations of the same question. Literature suggests that the reasoning process in LLMs is probabilistic pattern-matching rather than formal reasoning. ...
Read More »Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation
Bohemia and Cannabia Dark Web Markets Taken Down After Joint Police Operation https://firewall.firm.in/wp-content/uploads/2024/10/arrested.png Oct 11, 2024Ravie LakshmananCybercrime / Dark Web The Dutch police have announced the takedown of Bohemia and Cannabia, which has been described as the world’s largest and longest-running dark web market for illegal goods, drugs, and cybercrime services. The takedown is the result of a collaborative investigation ...
Read More »Report sounds the alarm on toxic cloud exposures threatening Indian organisations – ET CISO
Report sounds the alarm on toxic cloud exposures threatening Indian organisations – ET CISO https://etimg.etb2bimg.com/thumb/msid-114090161,imgsize-402500,width-1200,height=765,overlay-etciso/research/report-sounds-the-alarm-on-toxic-cloud-exposures-threatening-indian-organisations.jpg Rajnish Gupta Tenable, the exposure management company, released the Tenable Cloud Risk Report 2024, highlighting that organisations globally and in India are unknowingly exposed to the “toxic cloud triad,” a trifecta of cloud security risks that could lead to severe data breaches and financial losses. ...
Read More »GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks
GitHub, Telegram Bots, and QR Codes Abused in New Wave of Phishing Attacks https://firewall.firm.in/wp-content/uploads/2024/10/phishing.png A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages as a way to bypass security measures and deliver Remcos RAT, indicating that the method is gaining traction among threat actors. “In this campaign, legitimate repositories ...
Read More »Cyber attack on Uttarakhand’s ITDA, hacker seeks ransom – ET CISO
Cyber attack on Uttarakhand’s ITDA, hacker seeks ransom – ET CISO https://etimg.etb2bimg.com/thumb/msid-114107670,imgsize-1564323,width-1200,height=765,overlay-etciso/cybercrime-fraud/cyber-attack-on-uttarakhands-itda-hacker-seeks-ransom.jpg The Uttarakhand Police has registered a case against an unidentified person who allegedly hacked into the state’s Information Technology Development Agency (ITDA) server and demanded a ransom. An FIR under section 308(4)(extortion) of the BNS and 65/66/66C of the IT Act has been registered at the Cyber Crime ...
Read More »How Hybrid Password Attacks Work and How to Defend Against Them
How Hybrid Password Attacks Work and How to Defend Against Them https://firewall.firm.in/wp-content/uploads/2024/10/password.png Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge multiple cracking techniques to amplify their effectiveness. These combined approaches exploit the strengths of various methods, accelerating the password-cracking process. In this post, we’ll explore hybrid attacks — ...
Read More »