REGISTER

email 14 48

One long-running campaign targets at least nine governments across Asia, the Middle East, and Africa. The APT group uses rare backdoors to maintain persistence and hacks email servers for intelligence, as reported by Unit 42 of Palo Alto Networks. Active since at least late 2022, the group, codenamed CL-STA-0043, is tracked under Operation Diplomatic Specter.

Banco Santander has disclosed a significant data breach involving a third-party provider that compromised the personal data of both clients and employees. The breach has impacted the bank’s operations across three countries: Spain, Chile, and Uruguay.

The Intercontinental Exchange (ICE), the parent company of the New York Stock Exchange (NYSE), has been slapped with a $10 million penalty due to its subsidiaries' failure to promptly report a cyber intrusion to the Securities and Exchange Commission (SEC).

ABN Amro has issued a warning to its customers regarding a potential risk to their personal information following a ransomware attack on one of its suppliers. This incident has raised concerns about data security and the protection of sensitive information.

Ascension hospitals in Michigan and across the United States were recently subjected to a disruptive cyberattack, prompting a significant impact on their computer networks and clinical operations. As a result, the nonprofit health system, headquartered in St. Louis, Missouri, advised its business partners to sever online connections to its network in response to the incident.

Visa is rolling out an innovative AI solution to assess risk levels of transactions in real-time, aiming to thwart enumeration attacks facilitated by automated scripts and botnets.

In 2023, Kaspersky's findings revealed a notable surge in global mobile banking trojan assaults on Android users, marking a 33% increase from previous years. Additionally, cryptocurrency-related phishing activities experienced a significant uptick.

For around four years, Forest Blizzard (also known as Fancy Bear or APT28) has utilized a custom tool targeting a specific vulnerability in the Windows Print Spooler service (CVE-2022-38028). Named GooseEgg, this tool enables hackers to execute remote code, install backdoors, and steal credentials by granting them SYSTEM-level permissions.

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

CyberBanner

CyberBanner

Go to top