Category: CyberSecurity

  • Overview: Phish Tale of the Week Often times phishing/smishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Coinbase and informing you that action needs to be taken regarding your account. The message first prompts you with a notification that your account…

  • Netizen: February 2024 Vulnerability Review

    Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five vulnerabilities from February that should be immediately patched or addressed if present in your environment. Detailed writeups below:…

  • PyRIT: Microsoft’s Latest Tool for AI Red Teaming

    Microsoft has unveiled PyRIT (Python Risk Identification Tool), a pioneering open-access framework designed to enhance the security of generative AI technologies. This innovative tool aims to support the proactive identification of potential risks within AI systems, focusing on both security threats and responsible AI considerations, such as fairness and the accuracy of generated content. PyRIT…

  • LockBit Ransomware Network Compromised by NCA in International Cyber Operation

    The UK’s National Crime Agency (NCA) successfully thwarted LockBit, a notorious global cybercrime syndicate known for ransomware attacks. The operation, named Cronos, involved seizing control of LockBit’s network and was a collaborative effort with international law enforcement. This highlights the evolving capabilities of law enforcement against cyber threats and emphasizes the commitment to supporting recovery…

  • Understanding Data Disposal: A Key to Data Privacy

    Data disposal, a critical component of information lifecycle management, involves the processes and methods used to permanently remove or delete data from digital storage devices. This practice is essential in managing data securely, ensuring that once data is no longer required, it cannot be recovered or misused. Data disposal works by overwriting the original data…

  • FortiSIEM’s Critical OS Command Injection Vulnerabilities: CVE-2024-23108 and CVE-2024-23109

    Fortinet has recently issued a warning about two critical-severity vulnerabilities within its FortiSIEM platform. These vulnerabilities, identified as CVE-2024-23108 and CVE-2024-23109, both received the highest level of concern with a provisional Common Vulnerability Scoring System (CVSS) score of 10. These vulnerabilities have a high potential to be exploited without any form of authentication, a prospect…

  • Clorox’s August 2023 Cyberattack: A $49 Million Update

    In a recent SEC filing, Clorox, the American manufacturing giant known for its consumer and professional cleaning products, has disclosed the financial aftermath of a cyberattack that struck the company in August 2023. This cyber incident, which commenced on August 11, led to the company identifying unauthorized activities within its systems, prompting immediate action to…

  • Overview: Phish Tale of the Week Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this text message, the actors are appearing as Netflix and informing you that action needs to be taken regarding your payment method on your account. The message politely explains that our account…

  • Netizen: January 2024 Vulnerability Review

    Netizen’s Security Operations Center (SOC) has identified and detailed five critical vulnerabilities from January that should be promptly patched. These include issues in NetScaler ADC, NetScaler Gateway, Google Chrome, vCenter Server, and Apache ActiveMQ. Netizen offers advanced security solutions and services, including compliance support, vulnerability assessments, and an automated assessment tool.

  • The FTC’s Crackdown on Location Data Misuse: InMarket’s Landmark Settlement

    The Federal Trade Commission’s (FTC) January 18th enforcement actions signal a significant shift in the regulatory landscape concerning consumer privacy and data protection. One of the most striking instances of this change is the proposed settlement with InMarket Media, a Texas-based data aggregator. This case is noteworthy not only for its direct implications for InMarket…