Open Cybersecurity Schema Framework (OCSF) Joins the Linux Foundation to Optimize Critical Security Data

OCSF Simplifies Security Data Challenges and Creates Flexibility for Security Teams and Data Producers, Empowering Organizations to Effectively Mitigate Cyber Risks The Linux Foundation, the nonprofit organization enabling mass innovation through open source, welcomes the Open Cybersecurity Schema Framework (OCSF) to the Linux Foundation family of projects. This new partnership aims to drive the development and adoption…

Read More

4.5 lakh ‘mule’ Bank accounts used in cyber fraud schemes Freezed in many Public sector Banks in India

 As per the data, around 40,000 mule bank accounts were detected in branches of SBI; 10,000 in Punjab National Bank (including Oriental Bank of Commerce and United Bank of India); 7,000 in Canara Bank (including Syndicate Bank); 6,000 in Kotak Mahindra Bank; and 5,000 in Airtel Payments Bank. The Centre has frozen around 4.5 lakh…

Read More

Chinese hackers hijacked thousands of TP-Link WiFi routers for covert Cyberattacks

Microsoft observed that a covert Chinese botnet, relying on compromised TP-Link routers, commits stealthy password-spraying attacks, only attempting to access accounts once per day. This malicious operation was discovered in August 2023 and employed an average of 8,000 compromised devices at any given time, according to a new report by Microsoft Threat Intelligence. The botnet…

Read More

Global Cybersecurity Forum highlights the need for collective action to secure the Digital Future

RIYADH: Cybersecurity industry leaders have emphasized the growing importance of digital protection as the world becomes increasingly interconnected at a special event in Riyadh. Speaking at the Global Cybersecurity Forum, Saad Al-Aboodi, CEO of the Saudi Information Technology Co., highlighted the global nature of the challenge during an address at the event, titled “Advancing Collective…

Read More

Ivanti Cloud Addresses Critical Vulnerabilities in Endpoint Manager 

Ivanti Cloud Addresses Critical Vulnerabilities in Endpoint Manager According to the September 2024 security update published by Ivanti Cloud has enhanced its internal scanning, manual exploitation, and testing capabilities in recent months while also refining its responsible disclosure process to ensure the timely identification and resolution of potential issues. This has led to an increase…

Read More

Ivanti Release Warning on Newly Patched Cloud Appliance Vulnerability

IT management solutions provider Ivanti confirmed that a high-severity flaw patched this week in an older version of its Cloud Service Appliance (CSA) has been exploited in attacks. The vulnerability was fixed as part of the company’s September security update, which also included patches for critical and high-severity flaws in other products. Ivanti has revealed…

Read More

Global Checkmarx study reveals 63% of participating organisations have fallen victim to a software supply chain attack in past 2 years

As open source software grows to represent an ever-increasing percentage of enterprise application code, application security (AppSec) leaders and developers are challenged to mitigate the risk of falling victim to the weaponization of such packages by threat actors. Reporting on current open source AppSec practices and problems, Checkmarx, the industry leader in cloud-native application security for…

Read More

Reliance Jio, C-DOT spearhead cybersecurity push in El Salvador, Guatemala

India’s strategic foray into Central America: India is rapidly expanding its influence in Central America, particularly in the telecommunications and cybersecurity sectors. (Reuters) India is rapidly expanding its influence in Central America, particularly in the telecommunications and cybersecurity sectors. With a focus on El Salvador and Guatemala, India is set to make significant inroads, leveraging…

Read More

SYSTEMIC CYBER INCIDENTS REQUIRE RISK MANGEMENT SECURITY POLICIES

In July, a software update from the cybersecurity firm CrowdStrike caused Microsoft Windows operating systems to crash. The US Government Accountability Office called this event “potentially the largest IT outage in history.” The broad-based impact generated by the incident heightens the need to develop an effective risk management process to combat systemic cyber risks. The CrowdStrike incident…

Read More