“Cyber warfare is as much about psychological strategy as technical prowess.”
― James Scott
-
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials [email protected] (The Hacker News)
Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks. “Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and ResponseRead…
-
What is third-party risk management (TPRM)?
Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers.Read More
-
Researchers Detail Bitter APT’s Evolving Tactics as Its Geographic Scope Expands [email protected] (The Hacker News)
The threat actor known as Bitter has been assessed to be a state-backed hacking group that’s tasked with gathering intelligence that aligns with the interests of the Indian government. That’s according to new findings jointly published by Proofpoint and Threatray in an exhaustive two-part analysis. “Their diverse toolset shows consistent coding patterns across malware families,…
-
Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation [email protected] (The Hacker News)
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational…
-
Iran-Linked BladedFeline Hits Iraqi and Kurdish Targets with Whisper and Spearal Malware [email protected] (The Hacker News)
An Iran-aligned hacking group has been attributed to a new set of cyber attacks targeting Kurdish and Iraqi government officials in early 2024. The activity is tied to a threat group ESET tracks as BladedFeline, which is assessed with medium confidence to be a sub-cluster within OilRig, a known Iranian nation-state cyber actor. It’s said…
-
DoJ Seizes 145 Domains Tied to BidenCash Carding Marketplace in Global Takedown [email protected] (The Hacker News)
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145 clearnet and dark web domains associated with an illicit carding marketplace called BidenCash. “The operators of the BidenCash marketplace use the platform to simplify the process of buying and selling stolen credit cards and associated personal information,” the…
-
Critical Cisco ISE Auth Bypass Flaw Impacts Cloud Deployments on AWS, Azure, and OCI [email protected] (The Hacker News)
Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that, if successfully exploited, could allow unauthenticated actors to carry out malicious actions on susceptible systems. The security defect, tracked as CVE-2025-20286, carries a CVSS score of 9.9 out of 10.0. It has been described as a static…
-
What is the WannaCry ransomware attack?
WannaCry ransomware is a cyberattack that spread by exploiting vulnerabilities in earlier and unpatched versions of the Windows operating system (OS).Read More
-
A guide to risk registers: Benefits and examples
Risk registers document, prioritize and track an organization’s risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.Read More
-
Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App [email protected] (The Hacker News)
Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice phishing (aka vishing) campaigns designed to breach organizations’ Salesforce instances for large-scale data theft and subsequent extortion. The tech giant’s threat intelligence team is tracking the activity under the moniker UNC6040, which it said exhibits characteristics that align withRead…
“Security used to be an inconvenience sometimes, but now it’s a necessity all the time.”
― Martina Navratilova