Category: Cybersecurity Trends

HomeCybersecurity Trends

Vulnerability Summary Reports by Cybernetic GI – August 2024

Cybernetic GI Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD). The Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) /...

Continue Reading  

Top Vulnerabilities Exploited By Cybercriminals

The year 2022 saw cybercriminals targeting unpatched, internet-facing systems and older software vulnerabilities. The criminals seem to have exploited the publicly available Proof of Concept (PoC) code. The success of such actors appears to be more in exploiting known vulnerabilities...

Continue Reading  

Cybersecurity Risks Show an Increase for Cloud-based Apps

Cloud-based applications have brought convenience, speed, and a superior user experience, prompting many to use them frequently. Healthcare is one such sector where the penetration of such apps has seen a massive expansion. Also, with most companies in the healthcare...

Continue Reading  

Why Are Australian Hospitals Vulnerable to Cyber Attacks?

Australian hospitals should hire the services of cybersecurity companies to ensure adherence to HIPAA security standards, and safeguard patients’ data.

Continue Reading  

Log4j vulnerability: what should boards be asking?

Background The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern beyond the cyber security community. This is because Log4j - rather than being a single piece of software - is a software component that’s used by millions of computers worldwide running online services....

Continue Reading  

Apache Log4j Vulnerability Guidance

Background Apache Log4j2 is a ubiquitous library used by millions for Java applications; the library is part of the Apache Software Foundation’s Apache Logging Services project. The vulnerability CVE-2021-44228, disclosed on December 9, 2021, allows for remote code execution against...

Continue Reading  

Alert (AA21-291A) BlackMatter Ransomware : The Dark Side Returns

Background BlackMatter is a new ransomware threat discovered at the end of July 2021. BlackMatter is ransomware-as-a-service (Raas) tool that allows  the ransomware's developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims. This malware started...

Continue Reading  

FoggyWeb: SolarWinds Hackers Access Microsoft AD Servers

Background The Microsoft Threat Intelligence Center (MSTIC) has released information on the uncovering of a widespread malicious email campaign undertaken by the activity group that Microsoft tracks as NOBELIUM. Nobelium, which operates from Russia, is the name given to the threat actor behind...

Continue Reading  

TOP Routinely Exploited Vulnerabilities (AA21-209A)

Background Cyber actors continue to exploit publicly known—and often dated—software vulnerabilities against broad target sets, including public and private sector organizations worldwide. However, entities worldwide can mitigate the vulnerabilities listed in this report by applying the available patches to their...

Continue Reading  

CWE Top 25 Most Dangerous Software Weaknesses, 2021

Cybernetic GI Security Bulletin provides a summary of CWE Top 25 Most Dangerous Software Weaknesses in 2021. Entries may include additional information provided by organizations. This data may include identifying information, values, definitions, and related links. The patch information is...

Continue Reading