Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Foresiet

The Rise and fall of Raccoon Infostealer: Inside a Global Cybercrime Operation

In the ever-evolving landscape of cybercrime, malware-as-a-service (MaaS) has emerged as a lucrative business for cybercriminals. One of the most notorious examples is Raccoon Infostealer, malware designed to harvest personal and financial information from unsuspecting victims worldwide. The mastermind behind this operation, a Ukrainian national named Mark Sokolovsky, recently pleaded guilty in a U.S. federal court to his role in the cybercrime network.

Stay Ahead of Ransomware: Comprehensive Solutions against DragonForce Attacks

In the ever-evolving landscape of cybersecurity threats, the DragonForce ransomware group has quickly become a serious menace to organizations worldwide. First discovered in August 2023, DragonForce has made headlines by leveraging two powerful ransomware variants—a fork of the infamous LockBit3.0 and a modified version of ContiV3.

Embargo Ransomware Expands Attacks to Cloud Environments

Ransomware continues to evolve, and the latest escalation in tactics comes from the Embargo ransomware group. Threat actor Storm-0501, known for its previous ties to various ransomware groups, has now shifted its focus towards hybrid cloud environments, targeting both on-premise and cloud-based systems. This strategic shift poses significant risks for organizations relying on cloud infrastructure, particularly those in critical sectors such as healthcare, government, transportation, and law enforcement.

Novel Exploit Chain Enables Windows UAC Bypass: Understanding CVE-2024-6769

Researchers have uncovered a new vulnerability, tracked as CVE-2024-6769, which enables attackers to bypass Windows User Access Control (UAC) and elevate their privileges to gain full system control without triggering any alerts. This exploit, affecting Microsoft’s Windows platform, has sparked debate about whether UAC truly acts as a security boundary. While Microsoft does not classify this as a vulnerability, security experts warn organizations to be vigilant about the risks involved.

Millions of Kia Vehicles Exposed to Remote Hacks via License Plate: The Growing Risk of Automotive API Vulnerabilities

In an increasingly connected world, the lines between digital security and physical safety are rapidly blurring. The automotive industry, now more reliant on connectivity than ever before, faces a new wave of cybersecurity threats. Millions of Kia vehicles, ranging from the 2013 model year to 2025, were recently found to be vulnerable to remote hacking via license plate information.

Meta Fined Euro91 Million for Storing Facebook and Instagram Passwords in Plaintext

In a significant blow to its reputation and data security practices, Meta has been fined €91 million ($101.56 million) by the Irish Data Protection Commission (DPC) for a major security lapse dating back to March 2019. The investigation revealed that millions of Facebook and Instagram users' passwords were stored in plaintext, an alarming oversight for a company of Meta's scale and influence.

Governments Urge Stronger Security and Resilience for Undersea Cables

The U.S. government, along with global partners, is calling for immediate action to strengthen the security and resilience of undersea cable infrastructure. These cables, vital to the global economy and communications, transmit vast amounts of data, making them critical to the world’s digital infrastructure.

Cloudflare Abuse: How the SloppyLemming APT is Targeting Sensitive Organizations

In today’s cyber landscape, threat actors are becoming increasingly sophisticated, often leveraging free tools and cloud services to launch targeted attacks. One such group, known as SloppyLemming, is making waves by using platforms like Cloudflare Workers to engage in espionage against government and law enforcement agencies in the Indian subcontinent. This blog delves into their methods, targets, and how organizations can bolster their defenses against such threats.

Mozilla Under Fire: Allegations of User Tracking in Firefox

Mozilla, the organization behind the popular Firefox browser, is facing scrutiny from the European digital rights group NOYB (None Of Your Business) over alleged privacy violations. The complaint, lodged with Austria’s data protection authority, claims that Firefox employs a feature known as "Privacy-Preserving Attribution" (PPA) to track user behavior without explicit consent. This controversy raises significant questions about user privacy and the ethical responsibilities of tech companies.

Google's Transition to Rust Programming Reduces Android Memory Vulnerabilities by 52%

In a significant move towards enhancing the security of its Android operating system, Google has announced a substantial reduction in memory vulnerabilities by adopting memory-safe programming languages, particularly Rust. This shift aligns with Google's secure-by-design philosophy, aiming to minimize security risks associated with new code development. In this blog, we’ll explore the implications of this transition, the statistical outcomes, and what this means for the future of secure coding.