The National Cybersecurity Authority will coordinate and implement policies and measures to enhance Greece’s cybersecurity ecosystem and effectively prevent and manage cyberattacks.
Apple has released security patches for various devices and software, including iOS, iPadOS, macOS, tvOS, watchOS, and Safari. These patches address multiple security flaws, including two recently disclosed zero-day vulnerabilities.
Kubescape, an open-source project, has become the first to generate Vulnerability Exploitability eXchange (VEX) documents. VEX is a standard that helps share information about vulnerabilities and their potential for exploitation.
This settlement marks the first resolution by HHS involving a phishing attack that violated the Health Insurance Portability and Accountability Act (HIPAA), highlighting the need for healthcare organizations to prioritize cybersecurity measures.
LivaNova has not yet issued an official statement or response regarding the breach, and cybersecurity experts are closely monitoring the situation for further developments.
The APT group known as Sandman and a China-based threat cluster using the backdoor KEYPLUG share infrastructure control and management practices, indicating potential overlap in their operations.
Kelvin Security has been active since 2013, targeting public-facing systems to obtain user credentials and steal confidential data, which they would sell or leak on hacking forums.
According to an Apple-commissioned study conducted by a professor at MIT, ransomware attacks have seen a steep rise, with a nearly 70% increase in such attacks in the first nine months of 2023, primarily targeting organizations with sensitive data.
Law enforcement is suspected to be behind the recent outage of ALPHV ransomware gang’s websites. The negotiation and data leak sites, as well as the Tor negotiation URLs, have been down for over 30 hours.
Both bugs were found this summer in Qlik Sense — a data analytics tool used widely among government organizations and large businesses. The vulnerabilities provide hackers with an entry point into systems and allow them to elevate their privileges.