Unpatched vulnerabilities and design flaws in IoT devices have become a gateway for threat actors to penetrate user and corporate networks. CISOMAG The explosion of IoT...
Tag: CISO MAG
cisomag – Vestas Cyberattack Impacts Internal IT Systems
estas Wind Systems has been a victim of a cybersecurity incident; however, there is no indication it has impacted third-party operations. CISO MAG Vestas Wind Systems,...
Uncategorized
cisomag – New Trojan ‘‘Android.Cynos.7.origin’’ Infects 9Mn Android Devices
The newly discovered Trojan “Android.Cynos.7.origin” targets Russian and Chinese gamers, and has infected over 9.3 million Android devices via mobile games. CISO MAG Security researchers from Doctor...
cisomag – Zero-Day Exploits on High Demand on Dark Web
Several cybercriminal groups are found buying zero-day vulnerabilities and leasing exploit-as-a-service models on dark web forums. CISO MAG While security admins struggle to address the significant...
BotenaGo – A New Malware Targeting Millions of IoT Devices
Recently discovered BotenaGo malware reportedly uses the Go programming language and exploits vulnerable routers and IoT devices in over 30 different methods. CISO MAG Cybersecurity researchers...
cisomag – Cybersecurity is a Low Priority for India’s Private Sector
High levels of investments are required to improve the private sector’s cybersecurity framework and regulatory compliance in India. CISO MAG In the movie Die Hard 4.0, John McClane...
cisomag – Emotet Botnet Resurfaces via TrickBot
Emotet uses Windows systems infected with TrickBot malware to make malicious entry. CISO MAG Emotet, a banking-trojan-turned-botnet that primarily spread via emails, has raised its head...
cisomag – Trickbot Remains the Most Prevalent Malware
Check Point revealed that the infamous Trickbot Trojan remains the most prevalent malware variant, affecting 4% of organizations worldwide. CISOMAG The evolution of new malware variants...
cisomag – BotenaGo – A New Malware Targeting Millions of IoT Devices
Recently discovered BotenaGo malware reportedly uses the Go programming language and exploits vulnerable routers and IoT devices in over 30 different methods. CISOMAG Cybersecurity researchers at...
cisomag – BlackMatter Ransomware Group Shuts Shop Citing Pressures from Law Enforcement
BlackMatter ransomware group, which is said to be a successor of the DarkSide ransomware group, announced that it is shutting down its operations due to rising...
cisomag – Trick or Treat – Did You Fall for the Google Ads Crypto Scam?
Check Point Research has issued a warning about scammers exploiting Google Ads to steal crypto wallets. CISOMAG Check Point Research (CPR) has issued a warning about scammers exploiting...
cisomag – CISA Orders Federal Agencies to Mitigate Actively Exploited Vulnerabilities
CISA has issued a Binding Operational Directive (BOD) to reduce the risk posed by unpatched or actively exploited vulnerabilities. CISOMAG The threat of unpatched vulnerabilities is...