Python-based PXA Stealer has stolen data from more than 4000 victims in over 62 countries, according to SentinalLabs – Read More –
Category: Privacy/Governance Feed
With the changing needs of customers and the emergence of an increasingly digital financial service industry, Open Banking has… The post Open Banking: Balancing Innovation & Risk appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
CrowdStrike revealed the surge in cloud intrusions was partly driven by a 40% increase in Chinese-state actors exploiting these environments – Read More –
The Pwn2Own competition is offering a $1m reward to any teams able to unearth a WhatsApp code execution exploit – Read More –
Arctic Wolf has spotted an increase in Akira ransomware attacks targeting SonicWall SSL VPNs – Read More –
Web traffic to AI sites surged 50% from Feb 2024 to Jan 2025, driven by browser-based GenAI tools – Read More –
Forescout also observed a big rise in CVEs added to CISA’s KEV catalog, some of which impacted end-of-life products – Read More –
Microsoft has observed Russian state actor Secret Blizzard using an AiTM position to gain initial access, assisted by official domestic intercept systems – Read More –
Spikes in attacker activity precede the disclosure of vulnerabilities 80% of the time, according to a new GreyNoise report – Read More –
Flashpoint data reveals an 800% increase in credentials stolen via infostealers in just six months – Read More –
The UK’s AI Security Institute has announced a new AI misalignment research program – Read More –
The DoubleTrouble Android banking Trojan has evolved, using Discord for delivery and introducing several new features – Read More –
CISA has launched a new tool to streamline cyber incident response and aid in adversary eviction – Read More –
Semperis found that executives were physically threatened in 40% of ransomware incidents, in a bid to pressure victims to pay demands – Read More –
The arrest of members of the Scattered Spider cyber-attack group have temporarily halted new intrusions, however, similar threat actors continue to pose risks – Read More –
Avast researchers shared a step-by-step guide to decrypt files for victims of FunkSec ransomware – Read More –
Experts argue that password managers are still useful despite Microsoft Authenticator ditching its capabilities – Read More –
North Korea’s Lazarus Group has been blamed for a cyber-espionage campaign using open source packages – Read More –
A SentinelLabs report has revealed patents linked to firms aiding China’s cyber-espionage operations, exposing new capabilities – Read More –
A covert ATM attack used a Raspberry Pi to breach bank systems, employing stealthy malware and anti-forensics techniques – Read More –
Google’s Project Zero team will provide limited details of new vulnerabilities early following discovery, in a bid to speed up end users’ patching – Read More –
32.1% of vulnerabilities listed in VulnCheck’s Known Exploited Vulnerabilities catalog were weaponized before being detected or within the following day – Read More –
IBM found that the global average cost of a data breach has fallen by 9% compared to 2024, driven by improved detection and containment – Read More –
A total of 396 compromised Microsoft SharePoint systems have been identified globally, affecting 145 organizations across 41 countries in the wake of the ToolShell zero-day vulnerability – Read More –
The comprehensive guidance focuses on technical recommendations for securing agentic AI applications, from development to deployment – Read More –
Some of Orange’s professional and consumer services may be disrupted for a few days because of the cyber incident – Read More –
Flaw in Base44 allowed unauthorized access to private apps, bypassing authentication systems – Read More –
Backdoor malware Auto-Color targets Linux systems, exploiting SAP NetWeaver flaw CVE-2025-31324 – Read More –
In the dependent world on digital infrastructure, cyber security has become the cornerstone of organizational flexibility. Nevertheless, despite the… The post Cybersecurity Is Broken And Zero Trust Alone Won’t Fix It appeared first on JISA Softech Pvt Ltd. – Read More – JISA Softech Pvt Ltd
Hackers are actively exploiting two critical flaws in Cisco Identity Services Engine, said the US Cybersecurity and Infrastructure Security Agency – Read More –
The federal government has applied for forfeiture of the funds, which were seized by FBI Dallas in April 2025 – Read More –
A Scottish charity has been fined £18,000 for systematic data protection failings – Read More –
Two pro-Ukraine hacktivists have claimed responsibility for a destructive attack on Aeroflot – Read More –
10,000 WordPress sites vulnerable to takeover due to critical flaws in HT Contact Form Widget plugin – Read More –
Scattered Spider has targeted VMware vSphere environments, exploiting retail, airline and insurance sectors – Read More –
Insurance firm Allianz Life said that a threat actor accessed personally identifiable information of the majority of its 1.4 million US customers – Read More –
Despite claims by a hacker, French defense company Naval Group has detected no intrusions into its IT environments at the time of writing – Read More –
Arizonan woman sentenced to 102 months for operating laptop farm for North Korean IT workers – Read More –
Dating app Tea has been compromised by a hacker, resulting in the exposure of 13,000 selfies – Read More –
The US and partners from nine countries have taken down part of the ransomware group’s infrastructure – Read More –
Sygnia observed Chinese cyber campaign dubbed Fire Ant deploying sophisticated techniques to gain full compromise of victim environments, discovering isolated assets – Read More –
Cisco Talos warned that the Chaos group, thought to be formed of former BlackSuit members, has launched a wave of attacks targeted a variety of sectors – Read More –