NoviSpy Spyware Installed on Journalist’s Phone After Unlocking It With Cellebrite Tool https://firewall.firm.in/wp-content/uploads/2024/12/spyware.png A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware codenamed NoviSpy, according to a new report published by Amnesty International. “NoviSpy allows for capturing sensitive personal data from a target’s phone after infection and provides the ...
Read More »Blog
Digital payment agency NPCI highlights common tactics used by fraudsters, shares tips to stay safe – ET CISO
Digital payment agency NPCI highlights common tactics used by fraudsters, shares tips to stay safe – ET CISO https://etimg.etb2bimg.com/thumb/msid-116367839,imgsize-80642,width-1200,height=765,overlay-etciso/cybercrime-fraud/digital-payment-agency-npci-highlights-common-tactics-used-by-fraudsters-shares-tips-to-stay-safe.jpg The National Payments Corporation of India (NPCI) has issued a public advisory cautioning citizens about the growing menace of the ‘Digital Arrest’ scam. As India increasingly embraces digital payments, including the Unified Payments Interface (UPI), online frauds have surged. Prime Minister ...
Read More »AI in cybersecurity a battle between protection and exploitation: Experts, ET CISO
AI in cybersecurity a battle between protection and exploitation: Experts, ET CISO While artificial intelligence (AI), is being extensively used for disruptions in technology, it is much harder to use for protecting technology. This is due to the nature of the prompts required, making it challenging to apply AI effectively in cybersecurity, cite experts. They say designing and deploying AI ...
Read More »Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques
Thai Officials Targeted in Yokai Backdoor Campaign Using DLL Side-Loading Techniques https://firewall.firm.in/wp-content/uploads/2024/12/malware.png Dec 14, 2024Ravie LakshmananMalware / Cyber Threat Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to deliver a previously undocumented backdoor dubbed Yokai. “The target of the threat actors were Thailand officials based on the nature of ...
Read More »NetApp’s 2024 data complexity report reveals AI’s make or break year ahead – ET CISO
NetApp’s 2024 data complexity report reveals AI’s make or break year ahead – ET CISO https://etimg.etb2bimg.com/thumb/msid-116276896,imgsize-9624,width-1200,height=765,overlay-etciso/cybercrime-fraud/netapps-2024-data-complexity-report-reveals-ais-make-or-break-year-ahead.jpg NetApp®, the intelligent data infrastructure company, today released its second annual Data Complexity Report, which examines how global organisations are navigating the increasing complexity of managing their data for AI. This year’s report provides a global view into how AI will impact organisations in ...
Read More »Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action
Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action https://firewall.firm.in/wp-content/uploads/2024/12/badbox.png Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed ...
Read More »How to protect your communications through encryption – ET CISO
How to protect your communications through encryption – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277027,imgsize-49844,width-1200,height=765,overlay-etciso/corporate/how-to-protect-your-communications-through-encryption.jpg After a sprawling hacking campaign exposed the communications of an unknown number of Americans, US cybersecurity officials are advising people to use encryption in their communications. To safeguard against the risks highlighted by the campaign, which originated in China, federal cybersecurity authorities released an extensive list of security recommendations ...
Read More »How to Generate a CrowdStrike RFM Report With AI in Tines
How to Generate a CrowdStrike RFM Report With AI in Tines https://firewall.firm.in/wp-content/uploads/2024/12/main.png Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual “You Did What with ...
Read More »90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO
90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277183,imgsize-1234100,width-1200,height=765,overlay-etciso/corporate/90-of-indian-enterprises-agreed-that-cloud-transformation-is-fuelling-ai-adoption-ey-india.jpg AI-generated representative image Indian businesses are embracing cloud transformation as a critical enabler of AI adoption, according to the Indian findings of EY’s Global Cloud Implementation Study. With 90% of organizations affirming that AI adoption would not have been possible without cloud ...
Read More »Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms https://firewall.firm.in/wp-content/uploads/2024/12/exploit.png Dec 13, 2024The Hacker NewsIoT Security / Operational Technology Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to ...
Read More »