Yearly Archives: 2024
Telecom Acquisitions and KCOM sign strategic partnership
News
The agreement is set to come into effect on November 19
Telecom Acquisitions Limited (TAL) has announced the signing of a wholesa...
FBI: US facing escalating fraudulent emergency data requests
Most recent evidence of ramping EDR exploitation was a posting of "high-quality" .gov emails, including U.S. credentials, on a hacking ...
Market and Buyer’s Guide for Customer Identity and Access Management 2024
A major challenge in CIAM is managing fragmented and unreliable identity data, with 75% of businesses facing issues from inconsistent d...
Ongoing npm malware campaign involves Ethereum smart contracts
Typosquatted packages for Puppeteer, Bignum.js, and 285 other libraries have been leveraged by threat actors to enable malware compromi...
Singtel breach attributed to Volt Typhoon
Attackers behind the Singtel breach utilized a web shell, noted sources close to the matter. Such a webshell was previously reported by...
Novel ToxicPanda Android banking trojan used in global attacks
Attacks with the newly emergent ToxicPanda Android banking trojan have compromised more than 1,500 Android devices around the world, wi...
GenAI and Fraud | SC Media
Generative Artificial Intelligence (GenAI) is a category of AI capable of producing new content, including audio, code, images, text, a...
Ransomware attack disrupts Georgia hospital’s EHR system
Investigation into the incident and examination of recovery options are underway, according to the hospital, which emphasized that the ...
Active exploitation of Android vulnerabilities ongoing
Leading the actively exploited bugs is an Android Framework privilege escalation issue, tracked as CVE-2024-43093, which could be utili...
IBM Security Verify Access impacted by dozens of bugs
IBM Security Verify Access, an authorization and network security policy management solution, was discovered by IT security researcher ...