Popular Android Apps Like Xiaomi, WPS Office Vulnerable to File Overwrite Flaw https://firewall.firm.in/wp-content/uploads/2024/05/apps.png May 02, 2024NewsroomVulnerability / Android Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a malicious app to overwrite arbitrary files in the vulnerable app’s home directory. “The implications of this vulnerability pattern include arbitrary ...
Read More »Vulnerabilities & Exploits
Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO
Zero-day vulnerabilities becoming major source of cyberattacks: Verizon – ET CISO https://etimg.etb2bimg.com/thumb/msid-109773721,imgsize-874584,width-1200,height=765,overlay-etciso/corporate/zero-day-vulnerabilities-becoming-major-source-of-cyberattacks-verizon.jpg Cyberattacks stemming from exploitation of vulnerabilities for accessing data have shot up by a staggering 180% in 2023 and almost tripled over the past year, a new study has revealed. The growth is majorly fueled by the MOVEit vulnerability where hackers exploited a zero-day vulnerability in the MOVEit ...
Read More »CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability
CISA Warns of Active Exploitation of Severe GitLab Password Reset Vulnerability https://firewall.firm.in/wp-content/uploads/2024/05/gitlab.png May 02, 2024NewsroomVulnerability / Data Breach The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog, owing to active exploitation in the wild. Tracked as CVE-2023-7028 (CVSS score: 10.0), the maximum severity vulnerability could facilitate account ...
Read More »Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO
Comprehensive law to prevent organisations from hiding data breaches: Rajeev Chandrasekhar – ET CISO https://etimg.etb2bimg.com/thumb/msid-89821283,imgsize-52790,width-1200,height=765,overlay-etciso/news/comprehensive-law-to-prevent-organisations-from-hiding-data-breaches-rajeev-chandrasekhar.jpg Rajeev Chandrasekhar The government is working on comprehensive laws that will prevent corporations from hiding security and data breaches, said Rajeev Chandrasekhar, Union Minister of State for Electronics and IT. Chandrasekhar was speaking at the launch of IBM’s security command centre in Bengaluru. He said ...
Read More »Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds
Bitcoin Forensic Analysis Uncovers Money Laundering Clusters and Criminal Proceeds https://firewall.firm.in/wp-content/uploads/2024/05/blockchain.png May 01, 2024NewsroomFinancial Crime / Forensic Analysis A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity and money laundering, including detecting criminal proceeds sent to a crypto exchange and previously unknown wallets belonging to a Russian darknet market. ...
Read More »Protecting your web application from security breach – A primer – ET CISO
Protecting your web application from security breach – A primer – ET CISO https://etimg.etb2bimg.com/thumb/msid-93425610,imgsize-349780,width-1200,height=765,overlay-etciso/news/protecting-your-web-application-from-security-breach-a-primer.jpg By Venkatesh Sundar Going digital has become the norm today and software applications have become an integral part of our lives. However, this has also meant that data breaches and cyberattacks are also growing at an alarming rate. These breaches often come from minor glitches in ...
Read More »Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success
Everyone’s an Expert: How to Empower Your Employees for Cybersecurity Success https://firewall.firm.in/wp-content/uploads/2024/05/SAT_Buyers_Guide_Huntress.png May 01, 2024The Hacker NewsSecurity Awareness Training There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance of security, you’ve got to remain prepared to confront those very same threats. As a decision-maker for your organization, you ...
Read More »Most common types of data breaches and how they affect businesses during the festive season – ET CISO
Most common types of data breaches and how they affect businesses during the festive season – ET CISO https://etimg.etb2bimg.com/thumb/msid-94777073,imgsize-118896,width-1200,height=765,overlay-etciso/news/most-common-types-of-data-breaches-and-how-they-affect-businesses-during-the-festive-season.jpg Cyberattacks and data breaches on businesses often rise around the festive season. Firms that keep data may have to deal with high and long-term costs and consequences when breached. As online shopping increases rapidly, cybercriminals can target businesses and their customers ...
Read More »China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale
China-Linked ‘Muddling Meerkat’ Hijacks DNS to Map Internet on Global Scale https://firewall.firm.in/wp-content/uploads/2024/04/scan.png A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade security measures and conduct reconnaissance of networks across the world since October 2019. Cloud security firm Infoblox described the threat actor as likely affiliated ...
Read More »Most common types of data breaches and how they affect businesses during the festive season – ET CISO
Most common types of data breaches and how they affect businesses during the festive season – ET CISO https://etimg.etb2bimg.com/thumb/msid-94801771,imgsize-118896,width-1200,height=765,overlay-etciso/news/most-common-types-of-data-breaches-and-how-they-affect-businesses-during-the-festive-season.jpg Cyber-attacks and data breaches on businesses often rise around the festive season. Firms that keep data may have to deal with high and long-term costs and consequences when breached. As online shopping increases rapidly, cybercriminals can target businesses and their customers ...
Read More »