• 17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

    17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London

    British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for London (TfL). “The 17-year-old male was detained on suspicion of Computer Misuse Act offenses in relation to the attack, which was launched on TfL on 1 September,” the U.K. National Crime Agency (NCA) said. The…

    Read More

  • Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

    Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft

    Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR, 2024). Solving this problem resolves over 80% of your corporate risk, and a solution is possible.  However, most tools available on the market today cannot offer a complete defense against this attack vector because they…

    Read More

  • TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

    TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

    Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities to evade analysis and display fake login screens to capture victims’ banking credentials. “The mechanisms include using malformed ZIP files in combination with JSONPacker,” Cleafy security researchers Michele Roviello and Alessandro Strino said. “In addition,

    Read More

  • Unmasking the True Price of IT Downtime     

    Unmasking the True Price of IT Downtime     

    Imagine this: you walk into your office on a busy Monday morning, ready to tackle the week. But something’s wrong. Computers are unresponsive. Phones are silent. The internet is a ghost town. Your business has come to a grinding halt – victim of an IT outage. It’s a scenario every business owner fears. But beyond…

    Read More

  • Streamlining Success: A Guide to Task Automation for Small Enterprises

    Streamlining Success: A Guide to Task Automation for Small Enterprises

    Running a small business is a whirlwind. You juggle a million tasks and wear countless hats. You also constantly fight the clock. What if you could reclaim some of that precious time?  Enter task automation. It’s your secret weapon for streamlining your workflow and boosting productivity. By automating routine and repetitive tasks, small businesses can…

    Read More

  • Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

    Hacktivists Exploits WinRAR Vulnerability in Attacks Against Russia and Belarus

    A hacktivist group known as Head Mare has been linked to cyber attacks that exclusively target organizations located in Russia and Belarus. “Head Mare uses more up-to-date methods for obtaining initial access,” Kaspersky said in a Monday analysis of the group’s tactics and tools. “For instance, the attackers took advantage of the relatively recent CVE-2023-38831…

    Read More

  • New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

    Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation. “It appears that Cicada3301 ransomware primarily targets small to medium-sized businesses (SMBs), likely through opportunistic attacks that exploit vulnerabilities as the initial access vector,” cybersecurity

    Read More

  • Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

    Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users

    Mobile users in Brazil are the target of a new malware campaign that delivers a new Android banking trojan named Rocinante. “This malware family is capable of performing keylogging using the Accessibility Service, and is also able to steal PII from its victims using phishing screens posing as different banks,” Dutch security company ThreatFabric said.…

    Read More

  • Secrets Exposed: Why Your CISO Should Worry About Slack

    Secrets Exposed: Why Your CISO Should Worry About Slack

    In the digital realm, secrets (API keys, private keys, username and password combos, etc.) are the keys to the kingdom. But what if those keys were accidentally left out in the open in the very tools we use to collaborate every day? A Single Secret Can Wreak Havoc Imagine this: It’s a typical Tuesday in…

    Read More

  • New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    New Flaws in Microsoft macOS Apps Could Allow Hackers to Gain Unrestricted Access

    Eight vulnerabilities have been uncovered in Microsoft applications for macOS that an adversary could exploit to gain elevated privileges or access sensitive data by circumventing the operating system’s permissions-based model, which revolves around the Transparency, Consent, and Control (TCC) framework. “If successful, the adversary could gain any privileges already granted to the affected

    Read More