November 25, 2024

Blue Yonder ransomware attack disrupts grocery store supply chain

A ransomware attack targeted software provider Blue Yonder last week, leading to disruptions at multiple grocery stores and retailers, including Starbucks and two major supermarket chains in the UK. Blue Yonder, a global supply chain management service provider for over 3,000 organizations, confirmed on Friday that its managed services-hosted environment was hit by a ransomware incident on Nov. UK grocery […]
November 20, 2024

Hackers Hijack Unsecured Jupyter Notebooks to Stream Illegal Sports Broadcasts

Cybercriminals are taking advantage of poorly configured JupyterLab and Jupyter Notebooks to engage in stream ripping and facilitate sports piracy using live-streaming capture tools. The attackers gain initial access by hijacking unsecured Jupyter Notebooks and then execute a series of actions aimed at illegally streaming sports events. This hidden piracy operation was uncovered by the cloud security firm after one […]
November 12, 2024

Germany’s cybersecurity is on high alert ahead of elections

Germany is ramping up its cybersecurity efforts ahead of the upcoming elections, with Interior Minister Nancy Faeser emphasizing the importance of strong defenses against cyberattacks and disinformation. She cautioned about potential threats from Russia and other foreign entities, underscoring the need to protect democracy in the digital space.A report from the Federal Office for Information Security highlighted Germany’s susceptibility to […]
November 2, 2024

US continues investigation into Chinese cyber espionage campaign, as Volt Typhoon resurfaces

SecurityScorecard researchers revealed that the Chinese-affiliated threat group Volt Typhoon has rebuilt its botnet, which was disrupted by the FBI in January. In response, the U.S. government disclosed an ongoing cyber espionage campaign by China targeting commercial telecommunications infrastructure. The FBI and CISA confirmed that PRC-linked actors have compromised multiple telecom networks to steal customer call data, intercept private communications, […]