Search results for: “cyberattack”
-

FPV Drones in Modern Warfare
Explore the critical role of First-Person View (FPV) drones in modern warfare, their tactical superiority, and their impact on cyber and electronic warfare, including training and counter-drone measures.
-

Why Natural Disasters Outpace Cyber Threats in Destructive Power
This article provides a ‘Cyber Threat Perspective,’ comparing the destructive power of cyber incidents with natural catastrophes. It highlights that while cyberattacks cause economic disruption and data loss, their long-term physical destruction rarely matches the damage from natural disasters. The piece emphasizes the importance of a balanced view for robust risk management and policy-making.
-

Canada Imposes New Sanctions on Russian Drone and Energy Production
Canada has imposed new sanctions on Russia, targeting its drone and energy industries, and infrastructure implicated in cyberattacks against Ukraine. These measures escalate economic pressure aimed at curbing Russia’s ongoing conflict.
-

Active Directory Under Siege: Why Critical Infrastructure Remains a Prime Target
Active Directory, the foundational identity and access management service for over 90% of Fortune 1000 companies, remains a critical target for cyber adversaries, especially in essential sectors like critical infrastructure. This article discusses its vulnerabilities, common attack techniques like Golden Ticket and DCSync attacks, and the severe implications of breaches, as illustrated by the 2024…
-

Ransomware Attack Cripples Asahi Group Holdings’ Deliveries, Financials
A ransomware attack has severely impacted Asahi Group Holdings, disrupting beer deliveries and financial reporting for a month, highlighting critical vulnerabilities in supply chain integrity and data security for large corporations.
-

GootLoader Returns with Novel WOFF2 Font Obfuscation and WordPress Exploits
GootLoader returns with novel WOFF2 font obfuscation and WordPress exploits, rapidly compromising networks. The malware uses custom WOFF2 fonts and exploits WordPress comment sections to deliver malicious payloads.
-

EU Considers Banning Huawei Telecom Equipment for Member States
The European Union is contemplating a ban on Huawei telecommunications equipment for member states, driven by escalating cybersecurity and national security concerns. This move reflects a growing international apprehension regarding the integration of specific foreign technologies into global telecom networks and aims to fortify critical infrastructure against potential vulnerabilities.
-

GlassWorm Malware Resurfaces, Infecting VS Code Extensions with Stealthy Unicode Attack
The GlassWorm malware campaign has re-emerged, targeting the Visual Studio Code (VS Code) ecosystem with a new set of malicious extensions, signaling a persistent threat to developers. This sophisticated, self-propagating worm aims to compromise credentials and cryptocurrency assets using invisible Unicode characters to embed malicious code.
-

Samsung Zero-Click Vulnerability Exploited, Deploying LANDFALL Spyware
A critical zero-click vulnerability in Samsung devices has reportedly been exploited, enabling the deployment of sophisticated Android spyware known as LANDFALL. The attack vector, leveraging popular messaging platform WhatsApp, highlights the escalating threat of highly evasive surveillance tools.
-

Arctic Wolf Acquires UpSight Security, Bolstering Ransomware Prevention with Predictive AI
Arctic Wolf acquires UpSight Security to enhance ransomware prevention with predictive AI, integrating advanced capabilities into its Aurora endpoint platform for proactive threat neutralization and rapid recovery.
