Threats

UAC-0212 Attack Detection: Hackers Linked to UAC-0002 aka Sandworm APT Subcluster Launch Targeted Attacks Against the Ukrainian Critical Infrastructure 

UAC-0212 Attack Detection

In Q1 2024, defenders uncovered destructive cyberattacks against the information and communication technology systems (ICT) of approximately 20 organizations in the critical infrastructure sector across 10 regions of Ukraine. CERT-UA has been observing this activity tracked as a separate threat cluster, UAC-0133, which, with a high level of confidence, is linked to a nefarious russia-afiliated […]

The post UAC-0212 Attack Detection: Hackers Linked to UAC-0002 aka Sandworm APT Subcluster Launch Targeted Attacks Against the Ukrainian Critical Infrastructure  appeared first on SOC Prime.

News & Updates

Australia bans Kaspersky over national security concerns

Australia bans Kaspersky software over national security concerns, citing risks of foreign interference, espionage, and sabotage of government networks. Australian Government banned products and services provided by Russian cybersecurity firm Kaspersky over national security concerns. The Secretary of the Department of Home Affairs has issued a mandatory directive under the Protective Security Policy Framework (PSPF) […]
News & Updates

A data leak exposes the operations of the Chinese private firm TopSec, which provides Censorship-as-a-Service

A leak suggests that Chinese cybersecurity firm TopSec offers censorship-as-a-service services, it provided bespoke monitoring services to a state-owned enterprise facing a corruption scandal. SentinelLABS researchers analyzed a data leak that suggests that the Chinese cybersecurity firm TopSec offers censorship-as-a-service services. The origin of the data leak is unclear, the leak is large and inconsistently […]
Cybersecurity Tools

The ROI of Implementing a ZTNA solution

In today’s digital landscape, where cyber threats are evolving rapidly, organizations must rethink their approach to network security. Traditional security models, such as VPNs and perimeter-based defenses, are no longer sufficient to protect against sophisticated cyberattacks. This is where ZTNA solution emerges as a game-changer. But beyond just improving security, ZTNA solution also delivers a […]

The post The ROI of Implementing a ZTNA solution appeared first on Blogs on Information Technology, Network & Cybersecurity | Seqrite.

News & Updates

Threat Actors Stole Record $1.5 Billion Worth of Crypto from Bybit

Bybit crypto exchange recently lost a staggering $1.5 billion in what could be the largest cryptocurrency heist in history.

Bybit hit by devastating cyberattack

Threat actors launched a ruthless cyberattack on the well-regarded Bybit crypto exchange, stealing about $1.5 billion worth of crypto in the process.

The incident’s impact positioned it as the most significant crypto heist in history, more than doubling the previous most considerable attack, against Ronin Network ($625M).

Perpetrato

Scroll to Top