November 30, 2025
Dark Light

Blog Post

Cyber Intelligence >

APAC Organizations Unable to Prevent 41% of Cyberattacks – November 3rd

In a study by Forrester in collaboration with exposure management company, Tenable found that companies in the Asia Pacific region could not prevent 41% of cyberattacks within the past two years.

The APAC edition of the report “Old Habits Die Hard: How People, Process and Technology Challenges Are Hurting Cybersecurity” was based on a survey consisting of 219 cybersecurity leaders in APAC.

Read More

Forty Countries Vow to Not Pay Cyber Ransoms – November 1st

Forty US-allied countries pledged to no longer pay cybercrime ransoms at the second annual meeting of the International Counter Ransomware Initiative.

The idea behind the pledge is that as long as ransom is paid to these cyber criminals, it will continue. This initiative would also seek to encourage organizations within the participating countries to focus on improving their cybersecurity infrastructure rather than just folding to these cyber criminals.

Read More

Enterprises face a steep rise in insider threats

As we predicted earlier this year, harsh economic conditions across Western democracies are acting as a catalyst for cybercrime – particularly those cyber-attacks that target staff inside the organization. As cybersecurity becomes more effective, cybercriminals are finding ways to bypass digital security barriers by victimizing and sometimes terrorizing key personnel within the target organization.

Read More

United States to regulate AI

US President Joe Biden has issued an executive order aimed at regulating artificial intelligence (AI), urging Congress to pass the necessary legislation as swiftly as possible. The announcement was made only 48 hours before tomorrow’s Global AI Summit in the UK, which US Vice President Kamala Harris will attend. The push to swiftly legislate indicates that the threat of AI is being taken seriously globally, with governments taking a coordinated approach. A mass of legislation and backroom deals with IT companies is surely set to follow.

Read More

Europol Urges Police to Prepare for Quantum Computing – October 26th

Europol released a statement directed to European law enforcement agencies to prepare for the impact quantum computing will have on the cybersecurity ecosystem.

This warning is based on Europol’s latest report, “The Second Quantum Revolution: The Impact of Quantum Computing and Quantum Technologies on Law Enforcement” which dives into the threats and opportunities of quantum computing to threat actors.

Read More

Three-quarters of SMBs hit by serious cyber-attacks

Roughly three-quarters of small-to-medium-sized businesses (SMBs) have experienced a cyber-attack, a breach, or both in the last year. According to non-profit organization the Identity Theft Resource Center (ITRC)’s third annual ITRC Business Impact Report, 73 percent of owners or leaders of SMB’s reported being attacked or breached in the past 12 months, following a slight dip in the previous year.

Read More

North Korea funding weapons program with cybercrime

Last week, the US seized 17 website domains alleged to have been used to defraud US and foreign businesses. These seizures come hard on the heels of previously sealed October 2022 and January 2023 court-authorized seizures of approximately $1.5 million of the revenue that the same group of IT workers collected from unwitting victims. According to the US Justice Department, The Democratic People’s Republic of North Korea has installed bogus contractors to steal from US companies in order to pay for weapons development.

Read More

BHI Energy comes clean about devastating data breach – October 24th

US energy firm BHI Energy has shared details about an Akira ransomware gang attack that breached its network in May this year.

The gang used a third-party contractor’s account to reach BHI’s internal network through a VPN connection. In the weeks that followed the breach, 767K files, containing 690 GB of data were stolen. These included BHI’s Windows Active Directory database.

Read More

Plastic surgeons and patients targeted in extortion rackets

The Federal Bureau of Investigation (FBI) warns that cybercriminals and online blackmailers are targeting plastic surgeons to harvest electronically protected health information (ePHI) on their patients. Personal ePHI includes sensitive information and photographs, enabling the cybercriminals to extort money from the patients themselves as well as from plastic surgery practices, something that could prove lucrative to blackmailers targeting wealthy celebrities who are in the public eye.

Read More

BlackCat turns to ‘Munchkin’ to advance hacker operations – October 23rd

The BlackCat ransomware group has employed the use of a new tool, called Munchkin, making the Ransomware-as-a-Service (Raas) operation more attractive to potential affiliates. This is because Munchkin allows for the use of remote systems to deploy encryptors on network devices.

After violating a device’s security, the threat actors are able to install something called a VirtualBox, which enhances their ability to propagate a malicious payload across victim networks.

Read More

Law Enforcement takes down RagnarLocker base  – October 20th

Law enforcement officials are working around the clock to take down ransomware gangs by targeting their funding sources and online infrastructure. As part of these efforts, they have seized the RagnarLocker base, hoping this will disrupt one of the internet’s most malicious ransomware groups.

The collective law enforcement effort is made up of authorities from Europe, the US, and Japan.

Read More

Ransomware gangs start to fight dirty

According to cybersecurity company SecureWorks’ annual State of the Threat Report, over the last 12 months, attackers have shortened the time between the initial penetration of the corporate network to the ransomware demand itself from 4.5 days to less than one day. This period, known in the cybersecurity industry as ‘dwell time’, offers well-equipped cybercriminals a leisurely opportunity to drain the company of funds and its most sensitive secrets. In 10 percent of cases, ransomware was even deployed within five hours of initial access.

Read More

Ancestry data sold by threat actors online – October 10th

Ancestry site 23andMe with nearly 1M users has acknowledged a hacker leak, with hackers listing stolen data relating to family genetics online for sale. 

The hackers seemed to have targeted users of Ashkenazi Jewish heritage. The data includes the last name, sex, and 23andMe’s evaluation of where their ancestors came from. This is now being investigated, to find out who the threat actors are, along with the motive of the attack.

Read More

SiegedSec threat actors breach NATO – October 6th

Cybersecurity firm, CloudSEK is looking deeper into the leaked data from NATO, an attack claimed by the SiegedSec threat actors. SiegedSec threat actors, who announced this attack on a Telegram group, claim to not be a state-sponsored group. Instead, their attacks are based on ‘hacktivism’ or ‘just for fun’.

This attack on NATO has reportedly compromised 845MB of sensitive information from the organization, impacting 31 nations. NATO is now investigating the SiegedSec claims and is working together with firms to strengthen their cybersecurity efforts so this kind of attack will not be replicated.

Read More