Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Cyberattack Disrupts ...

 Firewall Daily

Japan Airlines (JAL) experienced an operational disruption on December 26, 2024, following a cyberattack that impacted its systems. Japan Airlines cyberattack caused delays across both domestic and international flights, prompting the airline to temporarily suspend ticket sales for same-day departures. While the   show more ...

cyberattack caused significant inconvenience to travelers, JAL assured the public that flight safety was not compromised. The cyberattack on Japan Airlines began at 7:24 AM JST on December 26, when the company detected an issue with its network equipment connecting internal systems to external networks. This problem caused a malfunction in the communication systems, disrupting the interaction between JAL's internal systems and external platforms. Within 90 minutes, JAL had taken immediate action by shutting down the affected router device to prevent further damage. However, the impact on JAL’s operations was felt throughout the day, with more than 40 flights delayed across various airports in Japan.  Details into the Japan Airlines Cyberattack  The airline temporarily halted bookings for same-day flights and disabled its mobile app, further frustrating passengers. Later in the afternoon, JAL announced that it had resumed ticket sales for same-day flights and restored its disrupted systems. The airline assured customers that no data had been compromised and confirmed there was no evidence of a virus or data breach. [caption id="attachment_99818" align="alignnone" width="1233"] Japan Airlines Confirms Cyber Incident (Source: JAL)[/caption] “Since 7:24 AM on December 26, 2024, there was a disruption in the network equipment connecting internal and external systems, resulting in malfunctions in systems communicating with external systems,” JAL stated in an update. “The cause of the failure and the impact range of the system issues have been identified, and the system has been restored. There has been no customer data leakage or virus damage.”  Despite the technical difficulties, JAL insisted that the safety of its flights was not impacted by the cyberattack. The airline confirmed that the disruption affected operations but did not compromise flight security. Sales for both domestic and international flights gradually resumed later in the day.  The disruption also led to the suspension of standby services for domestic flights, though no international flights were canceled. According to the public broadcaster NHK, by noon on Thursday, more than 40 flights had been delayed at various airports across Japan, with approximately 28 percent of JAL's scheduled flights being affected. Some of these delays were related to the cyberattack, while others were due to unrelated issues.  Investigation into the Cyberattack on Japan Airlines  JAL promptly launched an investigation into the cyberattack to uncover its origins and identify the perpetrators. The airline’s cybersecurity team acted swiftly to determine the cause of the disruption and implement corrective measures. Although no immediate claims of responsibility had been made, JAL’s management prioritized resolving the technical issues and fortifying its defenses to prevent future incidents. In an official statement addressing the situation, JAL expressed its condolences, saying: “We would like to once again express our sincere prayers for those who lost their lives on the Japan Coast Guard airplane. We extend our deepest condolences to their families and associates. Additionally, we deeply regret the great distress and inconvenience caused to all passengers, their families, and related parties who were on board our flight.” The cyberattack follows another recent incident involving Japan Airlines Flight 516, which tragically collided with a Japan Coast Guard aircraft on January 2, 2024. The crash resulted in significant loss of life and intensified scrutiny of the airline's safety protocols and overall operational security. JAL's quick response helped restore some order to its operations by the afternoon, but the event highlights the ongoing risk of cyberattacks in industries that rely heavily on real-time, digital communication systems. Airlines like JAL, which are highly dependent on integrated technology for booking systems, flight operations, and customer service, must continually invest in cybersecurity to protect against such disruptions. 

image for Indian Railways Webs ...

 Firewall Daily

Rail travelers across India faced disruption as the Indian Railway Catering and Tourism Corporation (IRCTC) website and mobile app went down, causing chaos during the crucial Tatkal ticket booking window. This IRCTC outage, which marks the second major disruption in December alone, left thousands of passengers   show more ...

frustrated, unable to book tickets during the peak hours.  IRCTC Outage: Maintenance Halts Ticket Bookings  The IRCTC website, which serves as the primary portal for online ticket bookings for Indian Railways, went offline just before the vital Tatkal booking window opened. According to outage-tracking platform Downdetector, around 2,500 users reported issues with accessing the site at approximately 10:25 am IST.   This was a critical time for travelers, as it coincided with the 10 AM window for AC class bookings and the 11 AM slot for non-AC class tickets, both of which see the highest demand for Tatkal tickets, reported ABP LIVE.   The website's failure to function during this peak period left many travelers unable to book their tickets, causing widespread frustration. The IRCTC system displayed a message indicating that the e-ticketing service was unavailable due to "maintenance activity," prompting customers to try again later.  IRCTC Website Maintenance: A Recurrent Issue  This isn't the first time this month that passengers have faced such issues. On December 9, a similar outage occurred, again attributed to maintenance activities. Despite the frequent disruptions, IRCTC has yet to release an official statement explaining the cause of these outages. However, the corporation has advised users to reach out to their customer care team for assistance during such downtime. Travelers were encouraged to call the following customer care numbers: 14646, 08044647999, and 08035734999, or email their concerns to etickets@irctc.co.in for resolutions.  Social Media Reactions: Customers Express Frustration  The IRCTC outage quickly became a trending topic on social media, with users expressing their anger and disappointment. Many took to X (formerly Twitter) to voice their frustrations, some even tagging Railway Minister Ashwini Vaishnaw and the Prime Minister's Office in their posts. The frustration was particularly high among those who rely on the Tatkal ticket system, which allows travelers to book tickets just a day before their journey. The timing of the IRCTC outage, which occurred during the prime booking hours, only added to the anger.  One user posted, “How can IRCTC website go down during tatkal timings??? Why are we even bothering about building a bullet train when we can't even build a functioning website??” Another user commented, “It is 10:11 am... still IRCTC is not opening. IRCTC should be investigated, there are definitely scams happening. By the time it opens, all the tickets are gone!”  The anger was not just about the inconvenience but also the sense of a system failure. A user stated, “Please leave this business, you guys are not capable. Hire better talent or privatize the whole thing.” Another tweet pointed out, “India is the largest IT hub in the world, yet it cannot fix a website. You collect taxes but fail to provide proper services in return. What a shame!”  As the IRCTC outage continued, more posts expressed disillusionment with the system. One user wrote, “Still opening… @RailMinIndia Seriously, the most incompetent department. They brag about new projects but can’t stabilize the reservation system. Utterly disappointed.” Others complained that once the website was operational again, only premium-priced tickets were available, often at double the regular rates.  Concerns About Manipulation of Ticket Booking System  The prolonged outage also raised concerns about the integrity of the ticket booking system. Several social media users alleged that once the website resumed functioning, tickets were quickly booked at inflated prices. Some accused those with insider access of booking tickets during downtime and reselling them at higher rates, further exacerbating the frustration among regular passengers.  One frustrated traveler shared their experience, saying, “I was trying to book a ticket, and the website crashed showing a 'maintenance' message. Every day, the website fails to respond at 10 AM, and when it finally opens, all the tickets are booked. Who is getting access and booking these tickets?”  Alternative Solutions for Ticket Cancellations  For passengers who were affected by the outage and needed to cancel their tickets, IRCTC provided alternative methods. They were advised to either call the customer care numbers provided earlier or email their ticket details to etickets@irctc.co.in for a Ticket Deposit Receipt (TDR). This would allow them to process refunds or cancel bookings that were impacted by the downtime.  What’s Next for IRCTC?  The repeated outages of the IRCTC website raise questions about the reliability and stability of the Indian Railway Catering and Tourism Corporation's online systems. Passengers have called for improvements in the platform's infrastructure and better handling of maintenance schedules to prevent such disruptions from affecting ticket bookings in the future.  The IRCTC website's outage on Thursday morning, particularly during the critical Tatkal booking window, left travelers angry and disappointed. As the IRCTC team works to resolve the issue, many are hoping for a more stable and efficient ticketing experience in the future. Until then, customers continue to face the challenges of frequent disruptions, leading to ongoing calls for better management of the IRCTC website and the overall ticket booking process. 

 Cybercrime

The agreement provides a framework for how law enforcement agencies in different countries coordinate on cybercrime investigations and is being touted as a way to reduce the number of safe havens for cybercriminals as well as help developing nations better protect their citizens from digital crimes.

 Feed

A Brazilian citizen has been charged in the United States for allegedly threatening to release data stolen by hacking into a company's network in March 2020. Junior Barros De Oliveira, 29, of Curitiba, Brazil has been charged with four counts of extortionate threats involving information obtained from protected computers and four counts of threatening communications, the U.S. Department of

 0CISO2CISO

Source: hackread.com – Author: Uzair Amir. Stay protected from SEO poisoning, a cyber threat exploiting search engine rankings to spread malware and phishing scams. Learn risks, real-world examples, and preventive measures for safer browsing. Did you know that over 80% (PDF) of cyberattacks exploit online   show more ...

platforms, including search engines? These indispensable tools guide billions of […] La entrada SEO Poisoning: How Cybercriminals Are Turning Search Engines into Traps – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Adobe

Source: securityboulevard.com – Author: NSFOCUS Overview Recently, NSFOCUS CERT detected that Adobe issued a security announcement and fixed any file read vulnerability in Adobe ColdFusion (CVE-2024-53961). Due to improper restrictions on pathnames in Adobe ColdFusion, unauthenticated attackers can bypass the   show more ...

application’s restrictions to read files or directories outside of the restricted directory. As a result, […] La entrada Adobe ColdFusion Any File Read Vulnerability (CVE-2024-53961) – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Amy Cohn Why is Integrating IAM Crucial for Your Security Policies? As we move more and more of our activities online, the importance of robust security policies cannot be overstated. And central to these security policies is a concept that remains somewhat nebulous in   show more ...

the minds of many – Identity and […] La entrada Feel Supported: Integrating IAM with Your Security Policies – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Amy Cohn How Effective is Your Modern Secrets Management Strategy? Have you ever wondered about the strength of your modern secrets management? In an age where security is paramount and breaches can mean irrevocable damage, it is essential to ensure your approach to   show more ...

Non-Human Identities (NHIs) and their secrets is rock […] La entrada Stay Calm and Secure: Secrets Management for the Modern Age – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Amy Cohn What Does Securing Your Cloud-Native Solutions Mean? Cloud-native solutions are becoming more popular by the day. They are seen as the future of application development and deployment in today’s digital age. But with great innovation comes great responsibility   show more ...

– the responsibility of securing these cloud-native solutions. Wondering what ‘securing […] La entrada Relax with Secure Cloud-Native Solutions – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cloud Security

Source: securityboulevard.com – Author: Amy Cohn Does the thought of data breaches keep you up at night? If so, you’re not alone. The modern, interconnected business landscape offers unprecedented opportunities for growth and innovation. However, it also presents new, complex security risks, especially when   show more ...

it comes to non-human identities (NHIs) and secrets management in cloud […] La entrada Drive Innovation with Enhanced Secrets Scanning – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 A Message Of Freedom

Source: securityboulevard.com – Author: Marc Handelman NASA Astronaut Jessica Meir’s Hanukkah Wishes from the International Space Station: Happy Hanukkah to all those who celebrate it on Earth! (Originally Published in 2019) Permalink *** This is a Security Bloggers Network syndicated blog from Infosecurity.   show more ...

US authored by Marc Handelman. Read the original post at: https://www.nasa.gov/astronauts/biographies/meir-u-jessica Original Post […] La entrada Happy Hanukkah To Our Friends And Families – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Marc Handelman Security Boulevard The Home of the Security Bloggers Network Original Post URL: https://securityboulevard.com/2024/12/a-merry-little-christmas-and-a-happy-new-year-2/ Category & Tags: Security Bloggers Network,Happy New Year,holidays,merry   show more ...

christmas,National Holidays – Security Bloggers Network,Happy New Year,holidays,merry christmas,National Holidays Views: 0 La entrada A Merry Little Christmas And A Happy New Year – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Iain Thomson Video In 2018, Rob Joyce, then Donald Trump’s White House Cybersecurity Coordinator, gave a surprise talk at the legendary hacking conference Shmoocon about his hobby. As the former head of the NSA’s Tailored Access Operations squad – the people   show more ...

who crack systems and gather intelligence for the US government […] La entrada Former NSA cyberspy’s not-so-secret hobby: Hacking Christmas lights – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 'Cyber

Source: sec.cloudapps.cisco.com – Author: . Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability High CVE-2023-20063 CWE-94 Download CSAF Email Summary A vulnerability in the inter-device communication mechanisms between devices that are running Cisco   show more ...

Firepower Threat Defense (FTD) Software and devices that are running Cisco Firepower Management (FMC) Software could allow […] La entrada Cisco Firepower Threat Defense Software and Firepower Management Center Software Code Injection Vulnerability – Source:sec.cloudapps.cisco.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 26, 2024 A cyberattack hit Japan Airlines (JAL), causing the suspension of ticket sales for flights departing on Thursday. A cyber attack hit Japan Airlines (JAL) on Thursday, the offensive began at 7:24 a.m. and impacted   show more ...

internal and external systems. The Associated Press reported that the […] La entrada A cyber attack hit Japan Airlines delaying ticket sales for flights – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Apache

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 26, 2024 Apache Software Foundation (ASF) addressed a critical SQL Injection vulnerability, tracked as CVE-2024-45387, in Apache Traffic Control. The Apache Software Foundation (ASF) released security updates to address a   show more ...

critical security vulnerability, tracked as CVE-2024-45387 (CVSS score 9.9), in Traffic Control. Traffic Control allows operators to set […] La entrada Apache fixed a critical SQL Injection in Apache Traffic Control – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 25, 2024 Iran-linked APT group Charming Kitten has been observed using a new variant of the BellaCiao malware dubbed BellaCPP, Kaspersky researchers warn. The Iran-linked APT group Charming Kitten has been observed using a C++   show more ...

variant of the BellaCiao malware, dubbed BellaCPP. BellaCiao, a .NET-based malware, […] La entrada BellaCPP, Charming Kitten’s BellaCiao variant written in C++ – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 APT

Source: securityaffairs.com – Author: Pierluigi Paganini Pierluigi Paganini December 25, 2024 Japanese and U.S. authorities attributed the theft of $308 million cryptocurrency from DMM Bitcoin to North Korean cyber actors. Japanese and U.S. authorities linked the $308 million cyber heist targeting   show more ...

cryptocurrency company DMM Bitcoin to North Korea-linked threat actors. On June 1st, the Japanese […] La entrada DMM Bitcoin $308M Bitcoin heist linked to North Korea – Source: securityaffairs.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Communications Security

Source: www.csoonline.com – Author: Feature 26 Dec 20246 mins Communications SecurityHacker GroupsTelecommunications Industry The alarming news that Chinese-affiliated threat groups have likely infiltrated US telecommunications is a reminder to consider where you can harden communications on your network. The   show more ...

FBI recently released information that text messages between Apple and Android texting systems were insecure and […] La entrada How are you securing your communications in the wake of the Volt Typhoon revelations? – Source: www.csoonline.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Waqas. SUMMARY Two California men charged in the largest NFT fraud case, stealing $22M via “rug pull” schemes. Fraudulent projects included “Vault of Gems” and “Faceless,” promising false features. Defendants allegedly intimidated others and hid their involvement in   show more ...

the scams. Charges carry penalties of up to 20 years for wire fraud […] La entrada Two Californians charged in the largest NFT fraud case to date – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. SUMMARY Dark Web Identity Fraud Operation: iProov uncovered a sophisticated dark web network collecting genuine identity documents and facial images to bypass KYC verification. Voluntary Identity Compromise: Individuals in regions like LATAM and Eastern Europe are   show more ...

willingly selling their personal and biometric data for short-term financial gain. Evolving Fraud […] La entrada Researchers Uncover Dark Web Operation Entirely Focused on KYC Bypass – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.infosecurity-magazine.com – Author: The Lumma Stealer infostealer malware is increasingly sought after by cybercriminals, according to cybersecurity firm ESET which reported a 369% surge in detections in its telemetry in the second half of 2024. Lumma Stealer first appeared in the wild in 2022,   show more ...

eventually appearing on the list of top ten infostealers detected […] La entrada Infostealers Dominate as Lumma Stealer Detections Soar by Almost 400% – Source: www.infosecurity-magazine.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 AI

Source: www.schneier.com – Author: Bruce Schneier Menu Blog Newsletter Books Essays News Talks Academic About Me HomeBlog Scams Based on Fake Google Emails Scammers are hacking Google Forms to send email to victims that come from google.com. Brian Krebs reports on the effects. Boing Boing post. Tags: AI,   show more ...

cryptocurrency, cybercrime, cybersecurity, Google, scams Posted on […] La entrada Scams Based on Fake Google Emails – Source: www.schneier.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered several security flaws in the cloud management platform developed by Ruijie Networks that could permit an attacker to take control of the network appliances. “These vulnerabilities affect both the Reyee platform, as well as   show more ...

Reyee OS network devices,” Claroty researchers Noam Moshe and Tomer Goldschmidt said […] La entrada Ruijie Networks’ Cloud Platform Flaws Could’ve Exposed 50,000 Devices to Remote Attacks – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 'Cyber

Source: cyble.com – Author: daksh sharma. Of the many reports created by Cyble’s talented team of threat researchers this year, seven stand out for their unique and comprehensive insight into the contemporary threat landscape. We’ll examine some of the key takeaways from the reports, including the changing   show more ...

nature of cyber threats and some surprising solutions readers […] La entrada Must-Read Cyble Research Reports of 2024: Trends and Key Takeaways – Source:cyble.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2024-12
Aggregator history
Thursday, December 26
SUN
MON
TUE
WED
THU
FRI
SAT
DecemberJanuaryFebruary