NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry? Go to Source Author: Aritra Banerjee
Author Archives: Onsite Computing, Inc.
Threat actors with ties to North Korea have been observed delivering a previously undocumented backdoor and remote access trojan (RAT) called VeilShell as part of a campaign targeting Cambodia and likely other Southeast Asian countries. The activity, dubbed SHROUDED#SLEEP by Securonix, is believed to be the handiwork of APT37, which is also known as InkySquid, […]
The US Cybersecurity and Infrastructure Security Agency (CISA) has warned Ivanti customers of active exploitation of a critical Endpoint Manager (EPM) vulnerability allowing remote code execution (RCE) that the company fixed in May 2024. Tracked as CVE-2024-29824, the flaw is an SQL injection vulnerability in the Ivanti EPM core server that allows an unauthenticated attacker […]
Meta is working with banks in the UK to curb the menace of online frauds that originate or are executed on social media platforms such as Facebook or Instagram. The Facebook parent company has announced the expansion of its Fraud Intelligence Reciprocal Exchange (FIRE) program, a threat intelligence sharing initiative designed to protect people against […]
INTERPOL has announced the arrest of eight individuals in Côte d’Ivoire and Nigeria as part of a crackdown on phishing scams and romance cyber fraud. Dubbed Operation Contender 2.0, the initiative is designed to tackle cyber-enabled crimes in West Africa, the agency said. One such threat involved a large-scale phishing scam targeting Swiss citizens that […]
A new wave of international law enforcement actions has led to four arrests and the takedown of nine servers linked to the LockBit (aka Bitwise Spider) ransomware operation, marking the latest salvo against what was once a prolific financially motivated group. This includes the arrest of a suspected LockBit developer in France while on holiday […]
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a security flaw impacting Endpoint Manager (EPM) that the company patched in May to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. The vulnerability, tracked as CVE-2024-29824, carries a CVSS score of 9.6 out of a maximum of 10.0, indicating […]
As much as cybersecurity professionals might prefer otherwise, ours is a field defined by reaction — just ask the average cyber analyst or threat hunter about their day to get a sense of how true this is. We are a technology-centric field in a functional sense, but technology evolves interactively alongside trends in economics, sociopolitical […]
CeranaKeeper is bombarding Southeast Asia with data exfiltration attacks via file-sharing services such as Pastebin, OneDrive, and GitHub, researchers say. Go to Source Author: Dark Reading Staff
Generative AI is being used to make cyberscams more believable. Here’s how organizations can counter that using newly emerging tools and reliable methods. Go to Source Author: Laura Wilber
