Tag: infrastructure
-
Romanian energy supplier Electrica hit by ransomware
by
in SecurityNews
Tags: attack, ceo, cyberattack, cybersecurity, election, group, hacker, identity, infrastructure, ransomware, russiaFirst, the Romanian presidential election was annulled after being targeted with cyberattacks from foreign state-sponsored actors and a suspected Russian-controlled massive TikTok influence campaign. Now the Electrica Group, a major electricity provider with 3.8 million customers in Romania, has fallen victim to a ransomware attack.The company told investors on Dec. 9 that it is working with national cybersecurity authorities…
-
US sanctions Chinese cybersecurity firm for firewall hacks targeting critical infrastructure
by
in SecurityNews
Tags: china, cybersecurity, exploit, firewall, hacking, infrastructure, sophos, vulnerability, zero-dayThe U.S. sanctioned a Chinese cybersecurity company and one of its employees for exploiting a zero-day vulnerability in Sophos firewalls to target U.S. organizations. On Tuesday, the U.S. Treasury Department said Guan Tianfeng, an employee of Sichuan Silence, used the vulnerability to compromise approximately 81,000 firewalls in April 2020. The hacking campaign, detailed by Sophos…
-
Androxgh0st Malware Continues Targeting IoT Devices and Critical Infrastructure
by
in SecurityNewsCybersecurity firm Check Point’s Global Threat Index for November 2024 underscores the escalating sophistication of cybercriminals. A key highlight is the rapid rise of Androxgh0st malware, now intergrated with the notorious Mozi botnet. This worrisome combination poses a significant threat to critical infrastructure globally. Critical infrastructure, encompassing energy grids, transportation systems, healthcare networks, and more,…
-
US sanctions Chinese firm for hacking firewalls in ransomware attacks
by
in SecurityNewsThe U.S. Treasury Department has sanctioned Chinese cybersecurity company Sichuan Silence and one of its employees for their involvement in a series of Ragnarok ransomware attacks targeting U.S. critical infrastructure companies and many other victims worldwide in April 2020. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/us-sanctions-chinese-firm-for-hacking-firewalls-in-ragnarok-ransomware-attacks/
-
Steady leadership prepares TSA to face evolving cyber threats
by
in SecurityNewsNew presidents bring new policies. But amid rapidly expanding cyber threats, steady leadership at the federal agencies charged with securing critical infrastructure is, well, critical. David Pekoske, a retired U.S. Coast Guard vice admiral and administrator of the Transportation Security Administration, is uniquely positioned to provide that leadership. Congress showed foresight in 2018 by creating…
-
Top IT predictions in APAC in 2025
by
in SecurityNewsEnterprises across the Asia-Pacific region are expected to focus on securing their AI workloads, invest in energy efficient infrastructure and rethink their platform strategy, among other tech trends in the new year First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366617035/Top-IT-predictions-in-APAC-in-2025
-
Ongoing Phishing and Malware Campaigns in December 2024
by
in SecurityNewsCyber attackers never stop inventing new ways to compromise their targets. That’s why organizations must stay updated on the latest threats. Here’s a quick rundown of the current malware and phishing attacks you need to know about to safeguard your infrastructure before they reach you.Zero-day Attack: Corrupted Malicious Files Evade Detection by Most Security Systems…
-
Researchers Uncovered Hackers Infrastructre Using Passive DNS Technique
by
in SecurityNewsCybersecurity researchers have unveiled an advanced technique to uncover hackers’ operational infrastructure using passive DNS data. This groundbreaking method sheds light on how attackers establish and maintain their networks to perpetrate malicious activities while remaining resilient to detection. By leveraging passive DNS analysis, experts have made significant strides in identifying threats before they wreak havoc,…
-
Mehrere Regionen betroffen: Russland nimmt sich für Testzwecke selbst vom Netz
by
in SecurityNews
Tags: infrastructureBerichten zufolge testet Russland derzeit die Infrastruktur seines eigenen, staatlich kontrollierten Internets. Geplante Ausfälle sind die Folge. First seen on golem.de Jump to article: www.golem.de/news/mehrere-regionen-betroffen-russland-nimmt-sich-fuer-testzwecke-selbst-vom-netz-2412-191566.html
-
Top tips for CISOs running red teams
by
in SecurityNewsRed team is the de facto standard in offensive security testing when you want to know how all security investments, from technological controls to user training to response procedures, work together when subjected to a targeted attack. Unlike penetration testing, which aims to comprehensively assess a system, or purple team, which assesses detection and response…
-
Bulletproof Hosting: The Dark Infrastructure Behind Global Cybercrime
by
in SecurityNewsA recent report by the Knownsec 404 team highlights the pivotal role of bulletproof hosting services in facilitating global cybercriminal activities. These specialized hosting providers, often referred to as >>dark... First seen on securityonline.info Jump to article: securityonline.info/bulletproof-hosting-the-dark-infrastructure-behind-global-cybercrime/
-
Cyberattack deluge hits Romanian election infrastructure
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/cyberattack-deluge-hits-romanian-election-infrastructure
-
35 more Semgrep rules: infrastructure, supply chain, and Ruby
by
in SecurityNewsBy Matt Schwager and Travis Peters We are publishing another set of custom Semgrep rules, bringing our total number of public rules to 115. This blog post will briefly cover the new rules, then explore two Semgrep features in depth: regex mode (especially how it compares against generic mode), and HCL language support for technologies……
-
Public and private sectors must partner to address generative AI’s interdependent energy and security requirements
by
in SecurityNewsCollaboration across government and industry is the only way to protect energy infrastructure in the generative AI age, a former ODNI official argues. First seen on cyberscoop.com Jump to article: cyberscoop.com/generative-ai-interdependent-energy-security/
-
Compromised Software Code Poses New Systemic Risk to U.S. Critical Infrastructure
by
in SecurityNewsNew Fortress Information Security research shows 90% of software products used by critical infrastructure organizations contain code developed in China. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/compromised-software-code-poses-systemic-risks-to-critical-infrastructure
-
BlueAlpha Exploits Cloudflare Tunnels for GammaDrop Malware Infrastructure
by
in SecurityNewsThe Insikt Group has uncovered a sophisticated cyber-espionage operation conducted by BlueAlpha, a state-sponsored threat actor with links to the Russian Federal Security Service (FSB). The campaign targets Ukrainian entities... First seen on securityonline.info Jump to article: securityonline.info/bluealpha-exploits-cloudflare-tunnels-for-gammadrop-malware-infrastructure/
-
US Officials Recommend Encryption Apps Amid Chinese Telecom Hacking
by
in SecurityNewsPlus: Russian spies keep hijacking other hackers’ infrastructure, Hydra dark web market admin gets life sentence in Russia, and more of the week’s top security news. First seen on wired.com Jump to article: www.wired.com/story/encryption-apps-chinese-telecom-hacking-hydra-russia-exxon/
-
Protect your clouds
by
in SecurityNewsGet best practice advice on how to safeguard your cloud infrastructure from SANS First seen on theregister.com Jump to article: www.theregister.com/2024/12/06/protect_your_clouds/
-
Turla targets Pakistani APT infrastructure for espionage
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/turla-targets-pakistani-apt-infrastructure-for-espionage
-
Open Source Security Priorities Get a Reshuffle
by
in SecurityNewsThe Census of Free and Open Source Software report, which identifies the most critical software projects, sees more cloud infrastructure and Python software designated as critical software components. First seen on darkreading.com Jump to article: www.darkreading.com/application-security/critical-open-source-rankings-shuffle-popularity-python-cloud-grows
-
Deutschland noch immer schlecht auf Cyberangriffe vorbereitet
by
in SecurityNewssrcset=”https://b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?quality=50&strip=all 5184w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=768%2C432&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1024%2C576&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1536%2C864&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2024/12/shutterstock_2523718547.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Jedes dritte Unternehmen aus dem Bereich der kritischen Infrastruktur in Deutschland fühlt sich schlecht auf Cyberangriffe vorbereitet. CHONRI510 Shutterstock.comMehr als die Hälfte der Unternehmen in Deutschland aus Bereichen…
-
Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware
by
in SecurityNewsBlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using spearphishing emails with malicious HTML attachments to deliver GammaLoad malware. To evade detection, BlueAlpha is leveraging Cloudflare Tunnels to conceal their infrastructure and using DNS fast-fluxing for their C2 servers, as this ongoing campaign, active since early 2024, highlights the persistent…
-
U.S. CISA adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog
by
in SecurityNewsU.S. Cybersecurity and Infrastructure Security Agency (CISA) adds CyberPanel flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the CyberPanel flaw CVE-2024-51378 (CVSS score: 10.0) to its Known Exploited Vulnerabilities (KEV) catalog. The getresetstatus vulnerability in CyberPanel (before commit 1c0c6cb) affects dns/views.py and ftp/views.py. Remote attackers could bypass authentication and execute…