As we wrap up our Cybersecurity Awareness Month series, we’d like to extend a huge thank you to everyone who contributed their insights and expertise. The response to this series has been incredible, and we’re grateful for the valuable advice shared by industry leaders throughout each article. In this fourth and final installment, we continue to highlight simple yet powerful steps to “Secure Our World.” While the cyber landscape is ever-evolving, one thing remains clear: adopting the right cybersecurity practices can make a real difference. With the collective wisdom of our experts, we hope this series has provided useful guidance…
Author: Kirsten Doyle
In a new and sophisticated campaign, the infamous North Korean-affiliated Lazarus APT group and its BlueNoroff subgroup have once again proven their expertise in exploiting zero-day vulnerabilities. The group, known for targeting financial institutions, governments, and even cryptocurrency platforms, has now expanded its operations to lure investors using a seemingly innocuous decentralized finance (DeFi) game. Lazarus, notorious for using its malware known as Manuscrypt, has been employing the malicious software since 2013 across more than 50 campaigns globally. These include attacks on governments, diplomatic entities, and cryptocurrency platforms. However, their latest exploit, detected as early as 13 May 2024 via…
WhatsApp is rolling out a series of updates aimed at making it easier for users to manage their contacts privately across devices. Previously, users could only add contacts via their mobile device by entering a phone number or scanning a QR code. Now, the Meta company is expanding contact management capabilities to WhatsApp Web and Windows, and eventually other linked devices. This new functionality also introduces the option to save contacts exclusively to WhatsApp. This feature is designed for users who share devices or want to separate personal and business contacts when managing multiple WhatsApp accounts on one phone. “Today…
Cybersecurity experts from Positive Technologies’ Security Expert Center (PT ESC) have uncovered an exploit targeting Roundcube Webmail, an open-source email client written in PHP. According to the researchers, Roundcube’s “extensive functionality and the convenient access it gives users to email accounts via a browser—without the need for full-fledged email clients—have made it popular among commercial and government organizations worldwide.” However, this popularity has also put us in the crosshairs of cybercriminals who rapidly adapt exploits once they become publicly known in the hope of stealing credentials and corporate email communications. The attack leverages a vulnerability—CVE-2024-37383—and poses a significant threat to firms that have yet to update their Roundcube…
The NHS App is set to undergo a major transformation, with plans to make full medical records, test results, and doctor’s letters accessible to patients across England. This initiative is part of a new 10-year strategy aimed at revolutionizing how patients engage with the healthcare system, with digitalization at its core. Government ministers hope the changes will ease healthcare access like apps have eased banking. At present, the app’s functionality is limited because patient records are stored separately by individual GP practices and hospitals, preventing seamless integration. However, under the new strategy, the government intends to establish a unified patient…
A novel attack, dubbed ConfusedPilot, has been discovered, targeting widely used Retrieval Augmented Generation (RAG)-based AI systems such as Microsoft 365 Copilot. This method allows malicious actors to manipulate AI-generated responses by introducing malicious content into documents referenced by these systems. The potential consequences include widespread misinformation and compromised decision-making across entities that rely on AI to help with critical tasks. With 65% of Fortune 500 companies currently implementing or planning to adopt RAG-based AI systems, the implications of these attacks are significant. The researchers from the University of Texas at Austin, led by Professor Mohit Tiwari, have highlighted the…
Due to the tremendous feedback we received on our first two articles, which shared invaluable cybersecurity advice from industry experts, we’re excited to continue the series with even more insights. In this third installment, we delve deeper into the theme of “Secure Our World” by presenting actionable strategies that anyone can implement to enhance their cybersecurity posture. These expert recommendations emphasize the critical need for tailored security practices, from protecting business operations to safeguarding personal information. No single solution can address every cyber threat, but by adopting these essential steps, organizations and individuals alike can significantly strengthen their defenses and…
Iranian cyber actors are targeting organizations across critical infrastructure sectors, using brute force techniques to obtain user credentials and sell sensitive information on cybercriminal forums. The attacks have affected healthcare, government, information technology, engineering, and energy sectors. This was announced in a coordinated alert by the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), Communications Security Establishment Canada (CSE), Australian Federal Police (AFP), and Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC). Attack Patterns and Techniques Since October 2023, Iranian threat actors have been leveraging brute force attacks, such as password spraying,…
Leading artificial intelligence (AI) models are failing to meet key European regulatory standards in areas such as cybersecurity resilience and prevention of discriminatory outputs, according to data obtained by Reuters. The EU AI Act is being implemented in phases over the next two years and was introduced to address the growing concerns around the ethical, societal, and safety implications of these technologies, which are becoming increasingly integrated into various aspects of daily life. It is the first comprehensive AI legislation introduced by a major regulatory body. It categorizes AI applications into three risk levels. First, applications deemed to pose an…
Sophisticated and complex threats fuel rapid and profound change in the cybersecurity landscape. Malicious actors are exploiting advanced technologies, like artificial intelligence (AI), to launch more targeted, destructive attacks that are harder to detect. As yesterday’s security solutions battle to keep up, the need for AI-driven cybersecurity solutions has become dire. AI-powered solutions can proactively detect threats and vulnerabilities so organizations can respond more rapidly and effectively. However, no machine is an island, and human expertise is indispensable when navigating the ethical, strategic, and creative dimensions of cybersecurity. AI-Driven Security: A Leap Forward in Cyber Defense AI is a powerful…