This malware poses as GTA IV and Adobe tool to steal data from MacBooks – ET CISO https://etimg.etb2bimg.com/thumb/msid-112755597,imgsize-8724,width-1200,height=765,overlay-etciso/ot-security/this-malware-poses-as-gta-iv-and-adobe-tool-to-steal-data-from-macbooks.jpg Security researchers have uncovered a new malware threat targeting macOS users. Dubbed “Cthulhu Stealer,” the malware impersonates popular apps to steal sensitive information such as system passwords, iCloud Keychain credentials, and cryptocurrency wallet data. According to a report by The Hacker News, ...
Read More »Blog
Halliburton probes impact of cyber attack with law enforcement, ET CISO
Halliburton probes impact of cyber attack with law enforcement, ET CISO Top U.S. oilfield services firm Halliburton said on Friday it was working with law enforcement to determine the extent of a computer systems breach and was yet to determine if the incident would have a material impact on its business. The $23-billion company became aware of the cyber attack ...
Read More »EU vs Big Tech: the cases keep mounting – ET CISO
EU vs Big Tech: the cases keep mounting – ET CISO https://etimg.etb2bimg.com/thumb/msid-111558319,imgsize-163662,width-1200,height=765,overlay-etciso/data-breaches/eu-vs-big-tech-the-cases-keep-mounting.jpg The European Union (EU) has launched multiple probes and complaints against Big Tech and their handling of user data and maintaining privacy. Let’s take a look at the latest tiffs: AmazonOn Friday, the European Commission (EC) asked Amazon to provide detailed information by July 26 on the measures ...
Read More »CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September
CISA Urges Federal Agencies to Patch Versa Director Vulnerability by September https://firewall.firm.in/wp-content/uploads/2024/08/cisa.png Aug 24, 2024Ravie LakshmananVulnerability / Government Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw impacting Versa Director to its Known Exploited Vulnerabilities (KEV) catalog based on evidence of active exploitation. The medium-severity vulnerability, tracked as CVE-2024-39717 (CVSS score: 6.6), is case of ...
Read More »Hackers use McDonald’s Instagram account to steal $700,000 in cryptocurrency scam – ET CISO
Hackers use McDonald’s Instagram account to steal $700,000 in cryptocurrency scam – ET CISO https://etimg.etb2bimg.com/thumb/msid-112728896,imgsize-1273550,width-1200,height=765,overlay-etciso/cybercrime-fraud/hackers-use-mcdonalds-instagram-account-to-steal-700000-in-cryptocurrency-scam.jpg McDonald’s official Instagram account was hacked recently. According to a report by the New York Post, the official Instagram account of the fast-food giant was hacked and the scammers used the account to lead a crypto scam which enabled them to make $700,000. What exactly ...
Read More »Data security experts urge govt to set up nodal body to confirm breaches – ET CISO
Data security experts urge govt to set up nodal body to confirm breaches – ET CISO https://etimg.etb2bimg.com/thumb/msid-111557082,imgsize-12516,width-1200,height=765,overlay-etciso/data-breaches/data-security-experts-urge-govt-to-set-up-nodal-body-to-confirm-breaches.jpg In light of alleged claims of hacking of Airtel data, security researchers have asked the govt to implement the data protection Act as under it the responsibility of informing/ confirming such breaches would be with the data protection authority, which, however, has not ...
Read More »The Facts About Continuous Penetration Testing and Why It’s Important
The Facts About Continuous Penetration Testing and Why It’s Important https://firewall.firm.in/wp-content/uploads/2024/08/code.png What is Continuous Attack Surface Penetration Testing or CASPT? Continuous Penetration Testing or Continuous Attack Surface Penetration Testing (CASPT) is an advanced security practice that involves the continuous, automated, and ongoing penetration testing services of an organization’s digital assets to identify and mitigate security vulnerabilities. CASPT is designed for ...
Read More »Google to help build cyber protection for Australian infrastructure – ET CISO
Google to help build cyber protection for Australian infrastructure – ET CISO https://etimg.etb2bimg.com/thumb/msid-112699531,imgsize-12526,width-1200,height=765,overlay-etciso/corporate/google-to-help-build-cyber-protection-for-australian-infrastructure.jpg Google and Australia’s national science agency will join hands to develop digital tools that automatically detect and fix software vulnerabilities for operators of critical infrastructure, seeking to combat a surge in cyberattacks. The software for organizations such as hospitals, defence bodies and energy suppliers will be customized ...
Read More »Ola founder on India’s data being sold back to country – ET CISO
Ola founder on India’s data being sold back to country – ET CISO https://etimg.etb2bimg.com/thumb/msid-111557069,imgsize-22000,width-1200,height=765,overlay-etciso/data-breaches/ola-founder-on-indias-data-being-sold-back-to-country.jpg Ola founder coins term ‘techno-colonialism’ to describe phenomenon where India’s data is exported abroad, processed, sold back to India Ola founder and CEO Bhavish Aggarwal has coined the term “techno-colonialism” to describe a modern phenomenon where India’s data is exported to global data centers, processed, and ...
Read More »New ‘ALBeast’ Vulnerability Exposes Weakness in AWS Application Load Balancer
New ‘ALBeast’ Vulnerability Exposes Weakness in AWS Application Load Balancer https://firewall.firm.in/wp-content/uploads/2024/08/aws.gif Aug 22, 2024Ravie LakshmananCloud Security / Application Security As many as 15,000 applications using Amazon Web Services’ (AWS) Application Load Balancer (ALB) for authentication are potentially susceptible to a configuration-based issue that could expose them to sidestep access controls and compromise applications. That’s according to findings from Israeli cybersecurity ...
Read More »