Tag: operational disruption

  • Slashdot: Cybersecurity World On Edge As CVE Program Prepares To Go Dark

    Source URL: https://it.slashdot.org/story/25/04/16/0050230/cybersecurity-world-on-edge-as-cve-program-prepares-to-go-dark?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Cybersecurity World On Edge As CVE Program Prepares To Go Dark Feedly Summary: AI Summary and Description: Yes Summary: The potential expiration of MITRE’s DHS contract on April 16, 2025, threatens the continuity of the Common Vulnerabilities and Exposures (CVE) and Common Weakness Enumeration (CWE) programs, which are crucial…

  • The Register: Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up

    Source URL: https://www.theregister.com/2025/03/18/extortionists_ox_thief_legal_threats/ Source: The Register Title: Extortion crew threatened to inform Edward Snowden (?!) if victim didn’t pay up Feedly Summary: Don’t laugh. This kind of warning shows crims are getting desperate Dark web analysts at infosec software vendor Fortra have discovered an extortion crew named Ox Thief that threatened to contact Edward Snowden…

  • CSA: The Evolution of DDoS Attacks: APIs in the Crosshairs

    Source URL: https://ciso.economictimes.indiatimes.com/news/cybercrime-fraud/the-evolution-of-ddos-attacks-why-apis-are-in-the-crosshairs/117904285 Source: CSA Title: The Evolution of DDoS Attacks: APIs in the Crosshairs Feedly Summary: AI Summary and Description: Yes Summary: The text emphasizes the rising threats against Application Programming Interfaces (APIs) in a hyper-connected digital landscape, particularly focusing on the alarming increase in API-targeted DDoS attacks in India. It highlights the complexity…

  • The Register: Malware variants that target operational tech systems are very rare – but 2 were found last year

    Source URL: https://www.theregister.com/2025/02/25/new_ics_malware_dragos/ Source: The Register Title: Malware variants that target operational tech systems are very rare – but 2 were found last year Feedly Summary: Fuxnet and FrostyGoop were both used in the Russia-Ukraine war Two new malware variants specifically designed to disrupt critical industrial processes were set loose on operational technology networks last…

  • The Register: London celebrity talent agency reports itself to ICO following Rhysida attack claims

    Source URL: https://www.theregister.com/2025/02/19/london_celebrity_talent_agency_reports/ Source: The Register Title: London celebrity talent agency reports itself to ICO following Rhysida attack claims Feedly Summary: Showbiz members’ passport scans already plastered online A London talent agency has reported itself to the UK’s data protection watchdog after the Rhysida ransomware crew last week claimed it had attacked the business, which…

  • The Register: FreSSH bugs undiscovered for years threaten OpenSSH security

    Source URL: https://www.theregister.com/2025/02/18/openssh_vulnerabilities_mitm_dos/ Source: The Register Title: FreSSH bugs undiscovered for years threaten OpenSSH security Feedly Summary: Exploit code now available for MitM and DoS attacks Researchers can disclose two brand-new vulnerabilities in OpenSSH now that patches have been released.… AI Summary and Description: Yes Summary: The text discusses two newly discovered vulnerabilities in OpenSSH,…