Blog
145,000 ICS Systems & Thousands of HMIs Exposed to Cyber Attacks: A Call for Urgent Action
Introduction: The Alarming State of ICS Security Critical infrastructure is under siege. According to a recent report from Censys, over 145,000 internet-exposed Industrial Control System (ICS) devices are vulnerable, including thousands of unsecured Human-Machine Interfaces (HMIs). These are the gateways to essential services like energy, water, and transportation — systems society cannot function without. […]
New Android Malware: SpyAgent – Screenshots and Spying on Users
What is SpyAgent Android Malware? SpyAgent is a newly discovered Android malware designed to spy on users by taking screenshots and capturing sensitive data. This malicious software is part of a growing trend in cybercrime targeting mobile devices, where attackers aim to compromise users’ privacy and steal valuable information. Features and Capabilities of SpyAgent […]
Androxgh0st Botnet Adopts Mozi Payloads, Expands IoT Reach
Introduction to the Androxgh0st Botnet’s Expansion CloudSEK’s Threat Research team recently published a report uncovering that the Androxgh0st botnet, active since January 2024, has started targeting web servers and exploiting vulnerabilities to infiltrate systems. The findings reveal that Androxgh0st is deploying payloads originally from the Mozi botnet, raising concerns about a potential operational alliance that […]
TSA Floats New Rules Mandating Cyber Incident Reporting for Pipelines and Railroads
Overview of Proposed Rules The Transportation Security Administration (TSA) has proposed new, comprehensive rules aimed at improving cybersecurity across the United States’ critical transportation infrastructure. The rules, if enacted, will formalize and make permanent several temporary directives issued since the infamous ransomware attack on Colonial Pipeline in 2021. The primary goal of these rules […]
New Malware Alert: SharpRhino and Emerging Ransomware Threats in 2024
Quorum Cyber Uncovers SharpRhino Malware Linked to Hunters International Quorum Cyber Incident Response recently identified a new malware strain named SharpRhino, linked to the Hunters International threat group, during a ransomware incident. This malware, written in C#, spreads through a typosquatting domain disguised as Angry IP Scanner, posing a serious security risk. Inside SharpRhino: A […]
CrossBarking: New Attack Exploiting Opera’s Private API
Guardio researchers recently uncovered a new browser-based cyberattack, known as “CrossBarking,” that exploits private APIs within the Opera browser, revealing significant security vulnerabilities. Private APIs are typically designed to give web applications secure access to various browser functions—like storage, geolocation, or performance enhancement. Most APIs are publicly accessible and rigorously reviewed, but some browsers, like […]
New Malware Campaign: Malicious Code Spread via Fake CAPTCHA Attacks
Introduction: The Rise of CAPTCHA-Based Attacks Cyber threats grow more advanced every day. In a recent example, attackers are using fake CAPTCHA tests—a common tool to distinguish humans from bots—to distribute malware. By tricking users into clicking familiar buttons, cybercriminals spread malicious code. This article will explain how this attack works, who it targets, and […]
5 New Challenges for Cybersecurity in 2022
Introduction Cybersecurity is a constantly evolving field. The way we protect our systems, devices, and data has changed dramatically over the past decade and it’s likely to change even more in the next few years. In this article, we’re going to take a look at five of the biggest challenges that organizations will face when […]
Comparison study of 10 leading pharma companies coming out in October
The goal of the data and cybersecurity exposure assessment to be published in October, 2022, by Cyber Intel Matrix, is to give an objective picture of current detected vulnerabilities, and through it a sectoral overview of typical vulnerabilities, weaknesses, and possible future threats. The study examines eight main perspectives of each company’s infrastructure: Account Takeover […]
What are the 6 Phases in a Cyber Incident Response Plan?
Introduction Cybersecurity is a growing concern for businesses. In a recent survey, 74% of organizations reported experiencing a cybersecurity incident in the last year alone. With so many cyber incidents occurring today, it’s essential to have an incident response plan in place before an attack occurs. It’s important to understand what these phrases mean and […]