Germany Disrupts BADBOX Malware on 30,000 Devices Using Sinkhole Action https://firewall.firm.in/wp-content/uploads/2024/12/badbox.png Dec 14, 2024Ravie LakshmananBotnet / Ad Fraud Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came preloaded on at least 30,000 internet-connected devices sold across the country. In a statement published earlier this week, authorities said they severed ...
Read More »Cyber Security News
How to protect your communications through encryption – ET CISO
How to protect your communications through encryption – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277027,imgsize-49844,width-1200,height=765,overlay-etciso/corporate/how-to-protect-your-communications-through-encryption.jpg After a sprawling hacking campaign exposed the communications of an unknown number of Americans, US cybersecurity officials are advising people to use encryption in their communications. To safeguard against the risks highlighted by the campaign, which originated in China, federal cybersecurity authorities released an extensive list of security recommendations ...
Read More »How to Generate a CrowdStrike RFM Report With AI in Tines
How to Generate a CrowdStrike RFM Report With AI in Tines https://firewall.firm.in/wp-content/uploads/2024/12/main.png Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform. Their bi-annual “You Did What with ...
Read More »90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO
90% of Indian enterprises agreed that cloud transformation is fuelling AI adoption: EY India – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277183,imgsize-1234100,width-1200,height=765,overlay-etciso/corporate/90-of-indian-enterprises-agreed-that-cloud-transformation-is-fuelling-ai-adoption-ey-india.jpg AI-generated representative image Indian businesses are embracing cloud transformation as a critical enabler of AI adoption, according to the Indian findings of EY’s Global Cloud Implementation Study. With 90% of organizations affirming that AI adoption would not have been possible without cloud ...
Read More »Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms
Iran-Linked IOCONTROL Malware Targets SCADA and Linux-Based IoT Platforms https://firewall.firm.in/wp-content/uploads/2024/12/exploit.png Dec 13, 2024The Hacker NewsIoT Security / Operational Technology Iran-affiliated threat actors have been linked to a new custom malware that’s geared toward IoT and operational technology (OT) environments in Israel and the United States. The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to ...
Read More »RBI policy acts big on banking frauds: New AI tool MuleHunter.ai by RBI to help reduce digital frauds – ET CISO
RBI policy acts big on banking frauds: New AI tool MuleHunter.ai by RBI to help reduce digital frauds – ET CISO https://etimg.etb2bimg.com/thumb/msid-116277484,imgsize-41924,width-1200,height=765,overlay-etciso/cybercrime-fraud/rbi-policy-acts-big-on-banking-frauds-new-ai-tool-mulehunter-ai-by-rbi-to-help-reduce-digital-frauds.jpg An innovative artificial intelligence based model called the ‘Mule Hunter.ai’ has been developed by the Reserve Bank innovation hub in Bengaluru. Governor Shaktikanta Das said that this new AI based system will help banks in reducing instances of ...
Read More »Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection
Critical OpenWrt Vulnerability Exposes Devices to Malicious Firmware Injection https://firewall.firm.in/wp-content/uploads/2024/12/openwrt.png Dec 13, 2024The Hacker NewsLinux / Vulnerability A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating ...
Read More »Digital Arrest Scams: Be cautious if callers claim to be govt officials and threaten with urgent legal action – ET CISO
Digital Arrest Scams: Be cautious if callers claim to be govt officials and threaten with urgent legal action – ET CISO https://etimg.etb2bimg.com/thumb/msid-116288782,imgsize-38754,width-1200,height=765,overlay-etciso/cybercrime-fraud/digital-arrest-scams-be-cautious-if-callers-claim-to-be-govt-officials-and-threaten-with-urgent-legal-action.jpg Digital payments are now accessible nationwide, driving India towards a digital-first economy. They offer both security and convenience. However, it’s crucial to use digital payments safely and avoid online scams. Early identification of potential scams helps protect you ...
Read More »key considerations for retailers adopting edge AI solutions, ET CISO
key considerations for retailers adopting edge AI solutions, ET CISO About twenty years ago, the retail industry was vastly different. It was defined by manual inventory counts and face-to-face conversations to understand customer preferences. Nearly half of industry respondents see AI and GenAI as key to enhancing end-to-end supply chain visibility, suggests Deloitte’s Global Retail Outlook report. The same proportion ...
Read More »390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits https://firewall.firm.in/wp-content/uploads/2024/12/github.png Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is estimated to have enabled the exfiltration of over 390,000 credentials. The malicious activity is part of a broader attack campaign undertaken ...
Read More »