Cybersecurity is nowadays the most crucial issue. The digital grounds and the mobile servers include a large amount of data that requires constant security from cyber crimes and online fraud. Criminal offenses are increasing daily, and most people’s data is at stake. Lately, Optus reported a serious cyberattack involving data breaching of almost 90% of the Australian population, and Tata Power has also written cyber attacks.
TSARO LABS is trying to stop cyber crimes. Its development approach provides stable, secure, and performant solutions with increased security uptake in prevention, detection, and resolution using AGILE practices and tools.
One of the leading power generation companies in India, Tata Power recently reported a cyberattack.
In a brief statement released on Friday, the Mumbai-based company said that the attack impacted some of its IT systems.
“The company has taken steps to retrieve and restore the systems. All critical operational systems are functioning; however, as a measure of abundant precaution, restricted access, and preventive checks have been put in place for employee and customer-facing portals and touchpoints,” it said in its filing with local stock exchanges.
Microsoft reported that the Prestige ransomware is used as a weapon to target transportation and logistics organizations in Ukraine and Poland in ongoing attacks.
This new ransomware was first used in the wild on October 11, in attacks detected within an hour of each other.
Attackers were seen deploying the ransomware payloads across their victims’ enterprise networks, a tactic very rarely seen in attacks targeting Ukrainian organizations.
Update from INTERPOL
INTERPOL has arrested over 70 suspected members of the ‘Black Axe’ cybercrime syndicate, with two believed to be responsible for $1.8 million in financial fraud.
The suspects were arrested on the grounds of ‘Operation Jackal,’ an international law enforcement operation between September 26 and 30, 2022, in South Africa.
Black Axe was founded in 1977 in Nigeria and is mentioned as one of the most brutal and dangerous crime syndicates.
Common Log File System (CLFS) has recently reported a flaw that could be used by an attacker to achieve login permission in restricted Machines.
The company noted in its advisory that “An attacker must already have access and the ability to run code on the target system.” “This technique does not allow for remote code execution in cases where the attacker does not already have that ability on the target system.