Case Study: The $230 Million WazirX Crypto Heist
1. Introduction In July 2024, WazirX, one of India’s leading cryptocurrency exchanges, suffered a significant cyberattack resulting in the theft of approximately $230 million worth of digital assets.
Read moreCisco Industrial Wireless Access Points Exposed to Critical Vulnerability
A critical security vulnerability, cataloged as CVE-2024-20418, has been identified in Cisco’s Industrial Wireless Access Points, widely used in industrial settings for wireless connectivity. Disclosed on November 7,
Read moreCritical Vulnerability in Palo Alto Networks’ Expedition Tool Actively Exploited
A critical security vulnerability, tracked as CVE-2024-5910, was recently discovered in Palo Alto Networks’ Expedition tool. This tool, which helps organizations manage and migrate firewall configurations, is widely
Read moreNorth Korean Hackers Deploy New Tactics to Target Cryptocurrency Firms
North Korean cybercriminals, long known for targeting cryptocurrency exchanges and firms, are evolving their tactics to increase their chances of successful infiltration. Recent reports show that these state-backed
Read moreGuLoader Malware Escalates Threats to Europe’s Industrial Sector
GuLoader malware, a notorious tool for delivering malicious software, is showing a resurgence in targeting European industrial organizations. These attacks, primarily driven by phishing, have created a cybersecurity
Read moreGoogle Cloud to Enforce Multi-Factor Authentication by 2025 for All Users
In a significant step toward enhancing user security, Google Cloud has announced that it will mandate multi-factor authentication (MFA) for all users by 2025. This policy shift underscores
Read moreINTERPOL Disrupts Over 22,000 Malicious Servers in Global Crackdown on Cybercrime
In a significant triumph for international cybersecurity, INTERPOL announced that it successfully disrupted more than 22,000 malicious servers as part of a global operation named Operation Synergia II.
Read more9 Steps to Get CTEM on Your 2025 Budgetary Radar
As the 2025 budget season approaches, cybersecurity teams face the annual challenge of securing funding amidst fierce competition for resources. Continuous Threat Exposure Management (CTEM) stands out as
Read moreNew Winos 4.0 Malware Infects Gamers Through Malicious Game Optimization Apps
Cybersecurity experts have raised the alarm over the emergence of Winos 4.0, an advanced command-and-control (C&C) malware framework that poses a significant threat to gamers. Distributed through seemingly
Read more