From Encryption to Extortion: The Ransomware Shift to Data Theft- Should you worry less?
Cybersecurity, Tech News Marcom ITSM.SG Cybersecurity, Tech News Marcom ITSM.SG

From Encryption to Extortion: The Ransomware Shift to Data Theft- Should you worry less?

Ransomware is changing. Attackers are shifting from encrypting files to stealing data and using it for extortion. While your systems may remain operational, the theft of sensitive information can lead to exposure on the dark web, reputational damage, and regulatory fines. This new tactic raises the stakes, demanding stronger defences against data exfiltration and extortion.

Read More
Disgruntled Employees and Compliance Policy: Preventing Data Breaches and Protecting Information
Cybersecurity, Tech News Marcom ITSM.SG Cybersecurity, Tech News Marcom ITSM.SG

Disgruntled Employees and Compliance Policy: Preventing Data Breaches and Protecting Information

In an increasingly interconnected business environment, the threat of data breaches looms large, not only from external hackers but also from within an organization.

Disgruntled employees, often overlooked as a potential risk, can become conduits for significant security incidents. Such individuals may possess authorized access to sensitive data, enabling them to either maliciously or unintentionally cause harm to the company. This scenario was starkly illustrated by a recent incident where a former employee, under the guise of whistleblowing about a data leak, inadvertently exposed confidential financial data of clients.

This breach underscores the critical need for robust compliance policies that not only set clear data handling protocols but also ensure that employees are regularly trained on these policies to prevent misuse of information.

Read More
D-Link NAS Devices Vulnerable to Malware Attacks
Cybersecurity Marcom ITSM.SG Cybersecurity Marcom ITSM.SG

D-Link NAS Devices Vulnerable to Malware Attacks

Cybersecurity concerns have escalated with the discovery that attackers are actively exploiting two critical vulnerabilities in D-Link network-attached storage devices, affecting roughly 92,000 devices exposed online. These vulnerabilities, identified as CVE-2024-3272 and CVE-2024-3273, impact several legacy D-Link models. Due to their end-of-life status, D-Link has announced it will not release patches, instead advising customers to replace the vulnerable devices.

Read More
Addressing the Critical CVE-2024-27198 in JetBrains TeamCity: Actions and Remediations
Cybersecurity Marcom ITSM.SG Cybersecurity Marcom ITSM.SG

Addressing the Critical CVE-2024-27198 in JetBrains TeamCity: Actions and Remediations

Explore our latest blog post for crucial insights on the CVE-2024-27198 vulnerability in JetBrains TeamCity, and learn about the critical steps needed for effective mitigation. If the thought of updating and patching sends you into a spiral of uncertainty, don’t worry—we're here to lend a helping hand through the remediation journey.

Read More
Malicious Actors Employ Obfuscation Techniques for Multi-Stage Malware Delivery Through Invoice Phishing Scams
Cybersecurity Marcom ITSM.SG Cybersecurity Marcom ITSM.SG

Malicious Actors Employ Obfuscation Techniques for Multi-Stage Malware Delivery Through Invoice Phishing Scams

Unveiling a sophisticated phishing campaign, cybersecurity experts uncover how attackers leverage invoice-themed emails to distribute complex malware, including Venom RAT and NanoCore RAT. Utilizing advanced obfuscation tools like BatCloak and ScrubCrypt, this operation highlights the escalating challenge of cyber threats and the critical need for enhanced security defenses.

Read More