LulzSec Muslims have declared their intent to resume their cyber offensive, launching a cyberattack on United Arab Emirates and Bahrain. The group, known for its previous cyber exploits against nations like Israel and India, recently made the announcement via their X (previously Twitter) account. In a video message show more ...
characterized by a distorted voice, the group identified themselves as “LulzSec Muslims” and reiterated their commitment to supporting oppressed communities globally. Citing perceived support for Israel by the UAE and Bahrain, the group outlined their rationale for the impending cyber onslaught. LulzSec Muslims Declare Cyberattack on UAE and Bahrain Source: ThreatMon on X The video highlighted the alleged facilitation of logistical and military support to Israel by the UAE and Bahrain, which LulzSec Muslims deemed as complicity in oppression. Threatening to target servers and websites affiliated with both nations, the group warned of cyberattack on United Arab Emirates and Bahrain aimed at disrupting their online infrastructure. Source: LulzSec on X “Hello, free people of the world. We are LulzSec Muslims. We founded our team on lofty principles to support the oppressed and the weak in this world. We are fighting with our friends the force of evil led by the Zionist entity, which is sill practicing genocide on the people of Gaza in a war of extermination for all….. Steady and moving for the fourth month and yet there are those who support his occupation in malicious ways”, says the video announcement. While bashing UAE and Bahrain for supporting Israel, the threat actor further added, “We have monitored the clear support provided by the United Arab Emirates and the State of Bahrain to Israel facilitating the transit of goods and material, logistical and military support. We have many documents to prove this and from on this platform we announce that the servers and websites of the UAE and Bahrain will be the target of our upcoming operations and may I excuse those who warn.” LulzSec Muslims Recent Attacks Source: Daily Dark Web This announcement comes on the heels of a reported Distributed Denial of Service (DDoS) attack on Sharjah International Airport attributed to LulzSec Muslims. The attack, which temporarily affected the airport’s website, underscores the group’s capability to carry out disruptive cyber activities. Furthermore, recent posts by LulzSec Muslims on various platforms suggest a sustained campaign against entities perceived as supporting Israel. These include claims of hacking Indian websites and the compromise of databases containing sensitive user information. In one instance, the group boasted of accessing data from an Indian health and fitness website, compromising the personal details of over 400,000 users. Additionally, LulzSec Muslims claimed responsibility for breaching the Banaras Hindu University’s database, citing India’s support for Israel as the motive behind the cyber intrusion. This is an ongoing story and The Cyber Express will be closely monitoring the situation. We’ll update this post once we have more information on the claims of a cyberattack on the United Arab Emirates and Bahrain or new announcements by the threat actor. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Binance, a well-known cryptocurrency exchange, has become embroiled in controversy amid claims of a possible KYC data breach emerging from a threat actor’s post on dark web. Speculation within the cryptocurrency sphere indicates that confidential user data, such as full names, countries, and phone numbers, has show more ...
emerged on the dark web, allegedly up for sale. Binance promptly addressed the situation, adamantly refuting any suggestion of a breach within its systems and assuring users of the security of their accounts. A spokesperson from Binance’s security team confirmed this to The Cyber Express team, emphasizing that thorough assessments had been conducted, affirming the absence of any leaks from Binance’s systems. Binance KYC Data Breach Claims Refuted “Our security team has assessed this – as they do all potential threats – and have confirmed there is no such leak from Binance systems,” a spokesperson from Binance’s security team told The Cyber Express. Adding that the accounts remain safe, they said, “Accounts are secured through many defenses, including MFA, biometrics, authenticators, etc. As always, we appreciate anyone sharing potential bugs and security issues with us so we can investigate and, where necessary, take action to protect users.” The company stated that following a comprehensive assessment, no evidence of the Binance KYC data breach was discovered. They emphasized that user accounts remain protected through a range of defenses, including Multi-Factor Authentication (MFA), biometrics, and authenticators. Binance Data Breach on Dark Web The Binance KYC data breach came to light when a threat actor named ‘jinx88’ shared a post on the dark web, pertaining to the alleged breach. Source: otteroooo on X The threat actor post reads, “Selling Binance Verified Users leads containing Name, Country and Phone number. The authenticity of data can be easily checked by trying to log in with the phone number on binance.com or by calling the user. There is data available worldwide, you can ask me for the country you’re interested in. The majority are Tier 1 English speakers.” Despite the circulating rumors, Binance has urged users to stay vigilant and report any suspicious activities, reaffirming its dedication to ensuring a secure trading environment for all users. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
A new category of malicious tools has been gaining popularity with crypto scammers lately: crypto wallet drainers. This post will explain what crypto drainers are, how they work, what makes them dangerous — even for experienced users — and how to defend against them. What a crypto (wallet) drainer is A crypto show more ...
drainer — or crypto wallet drainer — is a type of malware thats been targeting crypto owners since it first appeared just over a year ago. A crypto drainer is designed to (quickly) empty crypto wallets automatically by siphoning off either all or just the most valuable assets they contain, and placing them into the drainer operators wallets. As an example of this kind of theft, let us review the theft of 14 Bored Ape NFTs with a total value of over $1 million, which occurred on December 17, 2022. The scammers set up a fake website for the real Los Angeles-based movie studio Forte Pictures, and contacted a certain NFT collector on behalf of the company. They told the collector that they were making a film about NFT. Next, they asked the collector if they wanted to license the intellectual property (IP) rights to one of their Bored Ape NFTs so it could be used in the movie. According to the scammers, this required signing a contract on Unemployd, ostensibly a blockchain platform for licensing NFT-related intellectual property. However, after the victim approved the transaction, it turned out that all 14 Bored Ape NFTs belonging to them were sent to the malicious actor for a paltry 0.00000001 ETH (about US¢0.001 at the time). What the request to sign the contract looked like (left), and what actually happened after the transaction was approved (right). Source The scheme relied to a large extent on social engineering: the scammers courted the victim for more than a month with email messages, calls, fake legal documents, and so on. However, the centerpiece of this theft was the transaction that transferred the crypto assets into the scammers ownership, which they undertook at an opportune time. Such a transaction is what drainers rely on. How crypto drainers work Todays drainers can automate most of the work of emptying victims crypto wallets. First, they can help to find out the approximate value of crypto assets in a wallet and identify the most valuable ones. Second, they can create transactions and smart contracts to siphon off assets quickly and efficiently. And finally, they obfuscate fraudulent transactions, making them as vague as possible, so that its difficult to understand what exactly happens once the transaction is authorized. Armed with a drainer, malicious actors create fake web pages posing as websites for cryptocurrency projects of some sort. They often register lookalike domain names, taking advantage of the fact that these projects tend to use currently popular domain extensions that resemble one another. Then the scammers use a technique to lure the victim to these sites. Frequent pretexts are an airdrop or NFT minting: these models of rewarding user activity are popular in the crypto world, and scammers dont hesitate to take advantage of that. These X (Twitter) ads promoted NFT airdrops and new token launches on sites that contain the drainer. Source Also commonplace are some totally unlikely schemes: to draw users to a fake website, malicious actors recently used a hacked Twitter account that belonged to a blockchain security company! X (Twitter) ads for a supposedly limited-edition NFT collection on scam websites. Source Scammers have also been known to place ads on social media and search engines to lure victims to their forged websites. In the latter case, it helps them intercept customers of real crypto projects as they search for a link to a website theyre interested in. Without looking too closely, users click on the sponsored scam link, which is always displayed above organic search results, and end up on the fake website. Google search ads with links to scam websites containing crypto drainers. Source Then, the unsuspecting crypto owners are handed a transaction generated by the crypto drainer to sign. This can result in a direct transfer of funds to the scammers wallets, or more sophisticated scenarios such as transferring the rights to manage assets in the victims wallet to a smart contract. One way or another, once the malicious transaction is approved, all the valuable assets get siphoned off to the scammers wallets as quickly as possible. How dangerous crypto drainers are The popularity of drainers among crypto scammers is growing rapidly. According to a recent study on crypto drainer scams, more than 320,000 users were affected in 2023, with total damage of just under $300 million. The fraudulent transactions recorded by the researchers included around a dozen — worth more than a million dollars each. The largest value of loot taken in a single transaction amounted to a little over $24 million! Curiously, experienced cryptocurrency users fall prey to scams like this just like newbies. For example, the founder of the startup behind Nest Wallet was recently robbed of $125,000 worth of stETH by scammers who used a fake website promising an airdrop. How to protect against crypto drainers Dont put all your eggs in one basket: try to keep only a portion of your funds that you need for day-to-day management of your projects in hot crypto wallets, and store the bulk of your crypto assets in cold wallets. To be on the safe side, use multiple hot wallets: use one for your Web3 activities — such as drop hunting, use another to keep operating funds for these activities, and transfer your profits to cold wallets. Youll have to pay extra commission for transfers between the wallets, but malicious actors would hardly be able to steal anything from the empty wallet used for airdrops. Keep checking the websites you visit time and time again. Any suspicious detail is a reason to stop and double-check it all again. Dont click on sponsored links in search results: only use links in organic search results – that is, those that arent marked sponsored. Review every transaction detail carefully. Use companion browser extensions to verify transactions. These help identify fraudulent transactions and highlight what exactly will happen as a result of the transaction. Finally, be sure to install reliable security on all devices you use to manage crypto assets. How protection from crypto threats works in Kaspersky solutions By the way, Kaspersky solutions offer multi-layered protection against crypto threats. Be sure to use comprehensive security on all your devices: phones, tablets, and computers. Kaspersky Premium is a good cross-platform solution. Check that all basic and advanced security features are enabled and read our detailed instructions on protecting both hot and cold crypto wallets.
A recent Maxis Berhad cyberattack has been attributed to the R00TK1T ISC Cyber Team, stirring concerns about data security and network integrity for the Malaysian communications firm. The cyberattack on Maxis Berhad, which unfolded on February 5, 2024, was posted by the threat actor in a series of dark web posts, show more ...
which was also shared on a Telegram channel operated by the threat actor. The R00TK1T ISC Cyber Team disclosed intricate details regarding the cyberattack on Maxis Berhad. The breach revealed compromised Single Sign-On (SSO) user access to the FortiGate Firewall, providing unauthorized entry to sensitive employee data. Among the compromised information were MAC addresses, connection details on the Maxis WiFi network, and administrative access to the Maxis Interactive Retail Assistant (MIRA) dashboard. Decoding the Maxis Berhad Cyberattack Claims Source: Dark Web This Maxis Berhad cyberattack exposed employee identifiers, including employee IDs, names, Mobile Station International Subscriber Directory Numbers (MSISDN), business emails, and work locations within Maxis retail stores. Source: Dark Web The group also claimed to have penetrated third-party networks, such as the Malaysia-based Kulim Agrotech Centre, signaling a broader threat. In subsequent posts on their Telegram channel, the R00TK1T ISC Cyber Team threatened to divulge further infiltration details at regular intervals if Maxis downplayed the severity of the attack. The cyberattack targeted Maxis Berhad and had repercussions extending to the Kulim Agrotech Centre in Malaysia, highlighting the regional impact of cyber threats in Asia & Pacific (APAC). Maxis Communications, also known as Maxis Berhad, is one of the most prominent communications service providers within Malaysia. Renowned as one of the nation’s oldest and most expensive telecommunications firms, it has long been a partner of Malaysia’s telecommunications. Response to the Maxis Berhad Cyberattack Maxis Berhad is yet to issue an official statement or response regarding the cyberattack. The lack of acknowledgment from the company has left the claims surrounding the breach unverified. The Cyber Express has initiated inquiries into the Maxis Berhad cyberattack, aiming to gather insights into the incident’s scope and implications. However, as of the time of reporting, no official communication has been received from Maxis Berhad. This is an ongoing story and we will update this post once we have more information on the Maxis Berhad cyberattack or any official confirmation from the organization. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
A threat actor known as ‘IC3’ has released sensitive databases from well-known global entities—United Colors of Benetton (India), Watchmax (UK), and Tennessee Farmers Insurance (US)—onto the dark web. The leaked data includes a vast array of personal information such as names, dates of birth, contact show more ...
details, and even insurance-related specifics. This United Colors of Benetton data breach, along with the Watchmax breach and Tennessee Farmers Insurance data leak has raised concerns about the security and privacy of sensitive information belonging to customers and clients across various industries. Details of the United Colors of Benetton Data Breach and Other Leaks Source: Dark Web The dark web activity orchestrated by IC3 was first reported on the BreachForums on February 5, 2024. The databases disclosed include a staggering 500,000 records from the United Colors of Benetton data breach, 15,000 records from the Watchmax breach, and 71,000 records from the Tennessee Farmers Insurance Companies data leak. The compromised data encompasses a myriad of personal details, ranging from names, addresses, and contact information to more intricate details like license categories, accident information, and insured names. The breach has impacted the operations of United Colors of Benetton (India), Watchmax (UK), and Tennessee Farmers Insurance Companies (US). The fallout extends across the continents, affecting customers and clients in India, the United Kingdom, and the United States. The United Colors of Benetton data breach and other leaks, not only jeopardize individual privacy but also put the reputation of these organizations at stake. The compromised websites include in.benetton.com, watchmax.co.uk, and fbitn.com. IC3, the threat actor, posted on BreachForums, revealing the extent of the breach on Watchmax. The luxury jeweler’s data leak from 2022 contains customer information, with 15,000 lines disclosing details such as names, emails, addresses, and more. The post sheds light on the potential consequences of the Watchmax breach and other breaches, emphasizing the gravity of the situation. Awaiting Response The Cyber Express has initiated contact with the affected organizations to gather insights into the aftermath of the United Colors of Benetton data breach and other data leaks in this attack. As of now, no official statements or responses have been received, leaving the claims of the data breach on the dark web unconfirmed. The lack of immediate communication raises questions about the severity of the breach and the urgency of implementing security measures to mitigate the potential fallout. The Cyber Express is committed to closely monitoring the situation surrounding the United Colors of Benetton data breach, Watchmax breach, and Tennessee Farmers Insurance Companies data leak. Regular updates will be provided to ensure that individuals, customers, and the public are informed about any developments in the aftermath of these distressing cyber incidents. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Cyble, a trailblazer in the cybersecurity domain, has taken a significant leap forward with its ODIN platform. Aiming to streamline the workflow of cybersecurity researchers and information security professionals, ODIN has introduced an innovative feature that simplifies the analysis of IP addresses and Common show more ...
Vulnerabilities and Exposures (CVEs). This enhancement allows users to not only access detailed information about an IP address, including any associated vulnerabilities but also to download these details in a JSON file format directly from the platform. This new functionality is designed to significantly enhance the user experience by facilitating a smoother integration of ODIN’s insights into their existing systems. With the JSON file download feature, cybersecurity professionals can now easily import and analyze data, thereby improving both the speed and the quality of their security assessments and reporting. This update is a testament to Cyble’s commitment to providing comprehensive and user-friendly cybersecurity solutions, ensuring that users have the tools they need to stay ahead in the rapidly evolving landscape of cyber threats.
GhostSec, the hacktivist group known for its support of cyber threat actors and activists, continues to expand its activities in 2024. GhostSec 2024 plans and initiatives involve raising funds to help anonymize the identities of activists and hacktivists involved in various causes. The group launched a new project show more ...
called Low Cost Database, aimed at gathering funds to support individuals operating under false identities or seeking asylum due to their involvement in what they perceive as noble causes. Source: Cyble Unlike publicly leaked databases, GhostSec 2024 plans claim that the data offered through this project is sourced from collaborators, and they have provided a Telegram handle for collaboration. GhostSec 2024 Plans: Raising Funds for ‘Low-Cost-Database’ Project Cyble Research and Intelligence Labs (CRIL) recently reported about GhostSec’s Telegram channel, which has garnered 2,600 subscribers. The threat actor has already offered 28 datasets ranging from $40 to USD 70. These datasets affect organizations in countries such as India, Japan, Vietnam, and others. Source: Cyble This project is just one of GhostSec 2024 activities supporting activists and hacktivists. In the past, the group launched projects like NewBlood, aimed at educating newcomers in hacking, and WeFreeInternet, providing free VPN services to activists in restricted regions like Iran. Source: Cyble However, GhostSec’s actions have also came into the spotlight due to their involvement in leaking Personally Identifiable Information (PII) multiple times. While the group claims these actions are for social causes, the leaked data can be exploited by both activists and fraudsters for identity theft, posing a cybercrime risk. Source: Cyble Multiple Threat Actors Exhibiting Similar Patterns Source: Twitter In addition to GhostSec, other hacktivist groups like KillNet 2.0 have emerged, challenging conventional hierarchies in the hacker community. KillNet 2.0 emphasizes a decentralized structure and hardcore, targeted actions, reflecting a growing trend of hacktivism on a global scale. Despite their differing approaches, these groups share a common goal of using technology to advance social and political causes. However, their activities raise concerns about the anonymity of threat actors and the potential for malicious actions. To address these challenges, cybersecurity professionals stress the need for international cooperation and vigilance. Anonymity makes it difficult to attribute cyberattacks and track contemporary threats, highlighting the importance of better cybersecurity measures and collaboration among law enforcement agencies. Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Many people with ADHD, autism, dyslexia, and other neurodiverse conditions bring new perspectives that can help organizations solve cybersecurity challenges.
Tens of thousands of workers are effected by a fellow employee dipping into files that include everything from SSNs and names to union status and compensation data.
France, the UK, the US, and others will work on a framework for the responsible use of tools like NSO Group's Pegasus, and Shadowserver Foundation gains £1 million investment.
Full 10s on the CVSS vulnerability severity scale have been assigned to two flaws discovered in Fortinet's FortiSIEM cybersecurity operations platform.
The cyberattackers used SQL injection and XSS to target 65 retail companies and job recruiters, stealing databases with unique emails and other sensitive records.
The flaw allows attackers to bypass authentication and access restricted resources on vulnerable devices. The exploitation volume is high, with over 170 distinct IP addresses attempting to exploit the vulnerability.
The leak compromised highly confidential documents exchanged between the Ministry of Foreign Affairs and its international diplomatic missions, prompting discussions between Tokyo and Washington on countermeasures.
The court ruling allows the FTC to continue its enforcement action against data broker Kochava for selling non-anonymized, granular location data, setting the stage for potential limitations on data brokers' activities.
The security research team at Escape scanned 189.5 million URLs and discovered over 18,000 exposed API secrets, with 41% of them being highly critical and posing financial risks.
Collaboration between organizations and ethical hackers is essential as cyberattacks become more sophisticated, and bug bounty programs play a significant role in promoting online security.
The Philippines repelled a cyberattack from hackers suspected to be based in China, targeting multiple government departments. The attackers used IP addresses located in China, prompting lawmakers to demand an urgent briefing on national security
The cyberattacks targeted water systems in Pennsylvania and were carried out by an Iranian-backed militia group, exposing vulnerabilities in America's water infrastructure.
The cyberattack led to disruption in Clorox's business operations, requiring expenses for IT recovery, forensic experts, and professional services to investigate and remediate the attack.
The EUCC scheme is voluntary and aims to provide a common assessment process for ICT suppliers to certify products, based on the SOG-IS Common Criteria evaluation framework.
The stolen data, including over two million unique email addresses, was put up for sale in Chinese-speaking hacking-themed Telegram groups, with the majority of the focus on India, Taiwan, Thailand, and Vietnam.
Latio Application Security Tester simplifies code scanning with OpenAI, offering easy code change submission and GitHub Actions templates. The tool's future plans include support for non-OpenAI models, improved handling of large files, and more.
Hewlett Packard Enterprise (HPE) is investigating a potential breach after a threat actor claimed to have stolen HPE credentials and sensitive data and put it up for sale on a hacking forum.
A cyberattack over the weekend targeted the computer servers of Northern Light Health, a major Maine healthcare provider. As a precaution, it temporarily took all patient records offline, although the records were not on the affected servers.
The Commerce Department has sanctioned several European, Israeli, Russian, and Singaporean companies involved in the trafficking and development of spyware tools used for repression and human rights abuses.
Airbus Navblue Flysmart+ Manager had a vulnerability that allowed attackers to tamper with engine performance calculations and intercept data, posing a serious risk to flight safety.
The Pennsylvania Courts system has been hit by a cyberattack, taking down parts of its website. The Administrative Office of Pennsylvania Courts revealed via social media that the service had suffered a denial of service (DoS) attack.
Verizon Communications has reported an insider data breach affecting nearly half of its workforce, exposing sensitive employee information such as names, addresses, Social Security numbers, and compensation details.
Chinese state-sponsored hackers breached the internal computer network of the Dutch Ministry of Defence using a vulnerability in FortiGate devices. The breach was for espionage purposes and the malware was found in a compartmentalized network.
The FortiSIEM product from Fortinet has been found to have two new critical vulnerabilities, CVE-2024-23108 and CVE-2024-23109, which allow for remote code execution by unauthenticated attackers.
While it is unclear whether a ransom was paid, the company stated that client transaction data was not accessed during the attack. The attack occurred amidst a major business deal, but experts predicted minimal disruption to EquiLend's operations
The threat actors behind the campaign utilized multiple stages and techniques, including obfuscation and leveraging open platforms, to carry out the attack and steal sensitive information.
The malware is distributed through a multi-stage infection chain involving weaponized PDF files, internet shortcuts, and PowerShell loaders, with similarities to the previously disclosed Phemedrone Stealer.
Debian Linux Security Advisory 5616-1 - It was discovered that ruby-sanitize, a whitelist-based HTML sanitizer, insufficiently sanitized style elements, which may result in cross-site scripting.
By Christopher Budd, Director, Threat Research, X-Ops The Internet has become a ubiquitous part of everyday life and while its advantages are numerous and far-reaching, we need to ensure we are protecting ourselves and our precious personal information while online. Just as you wouldn’t drive your car down the show more ...
freeway without your seatbelt on, so too you shouldn’t hit the digital superhighway without the right safety measures to ensure you’re safe while navigating the Internet. Safer Internet Day 2024 on February 6 is a timely reminder of how to protect yourself on the internet—notably the importance of strong passwords to prevent credential theft, which is used to break into corporate networks and escalate privileges to steal data and eventually launch attacks such as ransomware. Safer Internet Day: What We Need to Do While we all hate passwords and think they’re a pain, they remain important. Even today we see major companies compromised because of bad password management by them or their staff. Using unique passwords for every site (or at least every important site) is still one of the best things you can do to keep yourself secure. In addition to using unique passwords, using a multifactor authentication app is a key step in securing your critical accounts and information. The Sophos X-Ops’ Active Adversary Report found that in 2023, for the first time, compromised credentials – where a cybercriminal uses the login details they have stolen to get into a business’ network – were the number one root cause of attacks that led to data theft and ransomware attacks, with more than half (56%) of the attacks analyzed linked to a name/password sign-information that wound up in unfriendly hands. That’s a 26% jump from 2022 to 2023. It’s also important to remember the power of ‘no.’ The best way to protect your data and information is to not give it away in the first place. Just because a site asks you for your birthday, doesn’t mean they need it, nor are they entitled to it. Put simply, if a site or service doesn’t have your information, they can’t lose it, accidentally disclose it nor can it be stolen from them. If you just do those two basic cyber hygiene things, you’ll be a long way towards keeping yourself safer online. However here are a few more tips to be even safer online: Use caution when clicking on links Keep all applications, apps, and devices up to date Invest in good security software Treat all unsolicited communications (email, phone calls, texts) as suspicious Disclaimer: The views and opinions expressed in this guest post are solely those of the author(s) and do not necessarily reflect the official policy or position of The Cyber Express. Any content provided by the author is of their opinion and is not intended to malign any religion, ethnic group, club, organization, company, individual, or anyone or anything.
In the past year, 18% of Qatari organizations experienced a cybersecurity incident, with 5% facing more than five incidents. The average cost per occurrence was estimated to be approximately US$4.94 million. Recognizing the critical importance of cybersecurity in addressing cybercrime effectively, it must be regarded show more ...
as an indispensable and integrated core function. Amidst this dynamic landscape, the eagerly awaited 8th edition of the CYSEC Global Summit is set to make a triumphant comeback through the CYSEC Qatar 2024 Summit. The CYSEC Qatar 2024 Summit will unfold in the lively capital city of Doha, Qatar. This exclusive gathering provides a crucial platform for leaders and experts in the Cyber and IT security industry to engage in essential discussions on pressing cybersecurity challenges and explore the latest innovations shaping the global cybersecurity landscape. This year, CYSEC Qatar 2024 (8TH Global Edition) will bring together an esteemed panel of industry experts and pioneers such as: Amr Metwally, Asst. Executive Director, ITQAN Clinical Simulation & Innovation Centre, Hamad Medical Corporation Hani Kanaan, Network Security Consultant, Ministry of Interior – Qatar John Mankarios, Vice President, Information Technology, QInvest Hamad Alrewaily, Information Systems Manager, Qatar Chemical Company Ltd. (QCHEM) Jamsheed P Chithari, Manager IT Infrastructure & Security, Qatar Insurance Company Click here for the full list of speaker line-up Key Highlights of the CYSEC Qatar 2024 Summit Diverse Perspectives, Dynamic Insights This CYSEC Qatar 2024 summit unites over 120 thought leaders from government, smart cities, BFSI, logistics, healthcare, defense, real estate, and more. Featuring 15 key sessions and more than 5 networking hours, it brings together IT, OT, and Security Leaders on one stage. Gain practical wisdom through real-world cases and success stories, addressing complex cybersecurity challenges. Live Demos, Exhibitions, And Exposure To Cutting Edge Technology Uncover the synergy of AI and machine learning in cybersecurity, and explore the transformative power of quantum technologies for digital security. The CYSEC Qatar 2024 summit’s exhibition area will feature live demonstrations of cutting-edge cybersecurity products, services, and solutions. Pioneering insights come from industry leaders, including txOne Networks, Colortokens, Mindware, Group-IB, Mandiant | Google Cloud, Cloudflare, RSA, Trend Micro, Ivanti, Quest | One Identity, and Phishrod, to name a few. Networking With more than 5 hours dedicated to networking, the CYSEC Qatar 2024 summit provides a fertile ground for professionals to connect, collaborate, and share ideas. This networking extravaganza ensures a dynamic environment, fostering valuable partnerships, potential collaborations, and engagement with solution providers. Impact Across Editions 2500+ IT, OT & Security Leaders 7 Editions Across the Middle East Hosting 80+ Cyber Security Companies 100+ Hours of Networking 2,570+ Introductory Meetings Arranged CYSEC Awards 2024 An integral part of this conclave is the CYSEC Awards 2024, which recognizes and celebrates outstanding contributions in the field of cybersecurity. The CYSEC Awards 2024 aims to honor individuals and organizations that have demonstrated excellence and commitment to driving transformative cybersecurity solutions. The CYSEC Awards 2024 will be adjudicated by a panel of esteemed experts and pioneers in the field of cybersecurity, ensuring a fair and comprehensive evaluation process. The distinguished jury members include: Amr Metwally | Assistant Executive Director, ITQAN Clinical Simulation & Innovation Centre, Hamad Medical Corporation Hani Kanaan | Network Security Consultant, Ministry of Interior – Qatar Hamad Alrewaily | Information Systems Manager, Qatar Chemical Company Ltd. (QCHEM) Registration and Further Information Registrations for the CYSEC QATAR 2024 Summit are now open. For further information about the summit, including the full speaker lineup, agenda, and registration details, please visit the official summit website: https://cysecglobal.com/ For sponsorship & exhibition opportunities, please register here. CYSEC QATAR 2024 Summit aims to contribute towards UAE’s future of cybersecurity and technology. Together, we can create a safer & resilient digital world for all. Press Contact: Shayantani Gupta Media Partnerships Email: shayantani@cysecglobal.com Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
The U.S. State Department said it's implementing a new policy that imposes visa restrictions on individuals who are linked to the illegal use of commercial spyware to surveil civil society members. "The misuse of commercial spyware threatens privacy and freedoms of expression, peaceful assembly, and association," Secretary of State Antony Blinken said. "Such targeting has been
Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have been targeted by a previously undocumented threat actor known as ResumeLooters since early 2023 with the goal of stealing sensitive data. Singapore-headquartered Group-IB said the hacking crew's activities are geared towards job search platforms and the theft of resumes, with as many as 65
A recently disclosed server-side request forgery (SSRF) vulnerability impacting Ivanti Connect Secure and Policy Secure products has come under mass exploitation. The Shadowserver Foundation said it observed exploitation attempts originating from more than 170 unique IP addresses that aim to establish a reverse shell, among others. The attacks exploit CVE-2024-21893 (CVSS
Threat actors are leveraging bogus Facebook job advertisements as a lure to trick prospective targets into installing a new Windows-based stealer malware codenamed Ov3r_Stealer. "This malware is designed to steal credentials and crypto wallets and send those to a Telegram channel that the threat actor monitors," Trustwave SpiderLabs said in a report shared with The Hacker News. Ov3r_Stealer
Three new security vulnerabilities have been discovered in Azure HDInsight's Apache Hadoop, Kafka, and Spark services that could be exploited to achieve privilege escalation and a regular expression denial-of-service (ReDoS) condition. "The new vulnerabilities affect any authenticated user of Azure HDInsight services such as Apache Ambari and Apache Oozie," Orca security
SaaS applications are the darlings of the software world. They enable work from anywhere, facilitate collaboration, and offer a cost-effective alternative to owning the software outright. At the same time, the very features that make SaaS apps so embraced – access from anywhere and collaboration – can also be exploited by threat actors. Recently, Adaptive Shield commissioned a Total Economic
Source: www.schneier.com – Author: Bruce Schneier HomeBlog Comments B.J. Herbison • February 5, 2024 11:36 AM Was the call recorded? On the call we have a bunch of scammers and one person who says “The deepfakes were great, I was fooled.” and sends the money. The “worried about a phishing email” might show more ...
be just posturing. […] La entrada Deepfake Fraud – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.infosecurity-magazine.com – Author: 1 The Pennsylvania Courts system has been hit by a cyber-attack, taking down parts of its website. The Administrative Office of Pennsylvania Courts revealed via social media that the service had suffered a denial of service (DoS) attack. The statement noted that show more ...
court web systems such as PACFile, the use of […] La entrada Pennsylvania Courts’ Website Disrupted by DoS Attack – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Every organization needs a cyber security executive who can lead well. Getting cyber security governance right matters more than ever before. The cyber threats are growing and becoming increasingly costly. The average expenses associated with a show more ...
ransomware attack exceed $4.25 million. You can’t afford to miss insights that […] La entrada 10 practical hacks to supercharge your cyber security leadership skills – Source: www.cybertalk.org se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.lastwatchdog.com – Author: bacohido By Bharat Bhushan Even in the cloud era, Microsoft Exchange Server remains a staple business communications tool across the globe. Related: The need for robust data recovery policies. One critical issue faced by organizations that rely on Exchange Server is the show more ...
risk of a corrupt Exchange Server database cropping up. […] La entrada GUEST ESSAY: Best practices to shrink the ever-present risk of Exchange Server getting corrupted – Source: www.lastwatchdog.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
Source: www.techrepublic.com – Author: Luis Millares Enpass fast facts Our rating: 4.0 stars out of 5 Pricing: Starts at $1.99 Key features Offline password manager. Can store user data on cloud service of choice. Fully free desktop version. Enpass is an offline password manager that lets you store your data show more ...
locally or on a third-party […] La entrada Enpass Review 2024: Pricing, Features, Pros, & Cons – Source: www.techrepublic.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.