Facebook users affected by data breach eligible for compensation, German court says – ET CISO https://etimg.etb2bimg.com/thumb/msid-115438376,imgsize-3037,width-1200,height=765,overlay-etciso/data-breaches/facebook-users-affected-by-data-breach-eligible-for-compensation-german-court-says.jpg BERLIN, – A German court said on Monday that Facebook users whose data was illegally obtained in 2018 and 2019 were eligible for compensation. The Federal Court of Justice (BGH) ruled that the loss of control over one’s data online was grounds for damages ...
Read More »Vulnerabilities & Exploits
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers https://firewall.firm.in/wp-content/uploads/2024/11/malware.png Nov 18, 2024Ravie LakshmananThreat Intelligence / Ransomware Cybersecurity researchers have shed light on a new stealthy malware loader called BabbleLoader that has been observed in the wild delivering information stealer families such as WhiteSnake and Meduza. BabbleLoader is an “extremely evasive loader, packed with defensive mechanisms, that is designed ...
Read More »The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think
The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think https://firewall.firm.in/wp-content/uploads/2024/11/git.png According to research from GitGuardian and CyberArk, 79% of IT decision-makers reported having experienced a secrets leak, up from 75% in the previous year’s report. At the same time, the number of leaked credentials has never been higher, with over 12.7 million hardcoded ...
Read More »THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17)
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 – Nov 17) https://firewall.firm.in/wp-content/uploads/2024/11/recap.png Nov 18, 2024Ravie LakshmananCybersecurity / Infosec What do hijacked websites, fake job offers, and sneaky ransomware have in common? They’re proof that cybercriminals are finding smarter, sneakier ways to exploit both systems and people. This week makes one thing clear: no system, no person, no organization ...
Read More »Turkey fines Amazon’s Twitch 2 million lira for data breach – ET CISO
Turkey fines Amazon’s Twitch 2 million lira for data breach – ET CISO https://etimg.etb2bimg.com/thumb/msid-115405112,imgsize-39952,width-1200,height=765,overlay-etciso/data-breaches/turkey-fines-amazons-twitch-2-million-lira-for-data-breach.jpg Turkey’s Personal Data Protection Board (KVKK) has fined Amazon.com’s gaming platform Twitch 2 million lira ($58,000) over a data breach, the official Anadolu Agency reported on Saturday. KVKK launched an investigation after a 125 GB data leak. It found that Twitch had failed to take adequate ...
Read More »NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit
NSO Group Exploited WhatsApp to Install Pegasus Spyware Even After Meta’s Lawsuit https://firewall.firm.in/wp-content/uploads/2024/11/whatsapp-exploit.png Nov 18, 2024Ravie LakshmananMobile Security / Spyware Legal documents released as part of an ongoing legal tussle between Meta’s WhatsApp and NSO Group have revealed that the Israeli spyware vendor used multiple exploits targeting the messaging app to deliver Pegasus, including one even after it was sued ...
Read More »Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin
Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin https://firewall.firm.in/wp-content/uploads/2024/11/bitcoin.png Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock exchange Bitfinex, has been sentenced to five years in prison, the U.S. Department of Justice (DoJ) announced Thursday. Lichtenstein was charged for his involvement in a money laundering scheme that led to the theft ...
Read More »How AI Is Transforming IAM and Identity Security
How AI Is Transforming IAM and Identity Security https://firewall.firm.in/wp-content/uploads/2024/11/entro.png In recent years, artificial intelligence (AI) has begun revolutionizing Identity Access Management (IAM), reshaping how cybersecurity is approached in this crucial field. Leveraging AI in IAM is about tapping into its analytical capabilities to monitor access patterns and identify anomalies that could signal a potential security breach. The focus has expanded ...
Read More »Equinox discloses data breach involving health info of clients, staff – ET CISO
Equinox discloses data breach involving health info of clients, staff – ET CISO https://etimg.etb2bimg.com/thumb/msid-115355746,imgsize-114899,width-1200,height=765,overlay-etciso/data-breaches/equinox-discloses-data-breach-involving-health-info-of-clients-staff.jpg Counseling and health services firm Equinox on Friday disclosed a data breach involving the personal health information of some current and former clients, as well as staff and has notified the individuals likely to have been affected. The company had on April 29 discovered an unusual ...
Read More »Live Webinar: Dive Deep into Crypto Agility and Certificate Management
Live Webinar: Dive Deep into Crypto Agility and Certificate Management https://firewall.firm.in/wp-content/uploads/2024/11/ssl.png Nov 15, 2024The Hacker NewsWebinar / Cyber Security In the fast-paced digital world, trust is everything—but what happens when that trust is disrupted? Certificate revocations, though rare, can send shockwaves through your operations, impacting security, customer confidence, and business continuity. Are you prepared to act swiftly when the unexpected ...
Read More »
Firewall Security Company India Complete Firewall Security Solutions Provider Company in India











