{"id":9396,"date":"2024-10-07T15:23:08","date_gmt":"2024-10-07T12:23:08","guid":{"rendered":"https:\/\/cyberone.bg\/?p=9396"},"modified":"2024-10-07T15:23:08","modified_gmt":"2024-10-07T12:23:08","slug":"weekly-cybersecurity-report-week-40-2024","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-40-2024","title":{"rendered":"Weekly Cybersecurity Report | Week 40, 2024"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 40, 2024<\/h2>\n<p><b><span data-contrast=\"auto\">Information security updates and events from the past week<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559739&quot;:60}\">\u00a0<\/span><\/p>\n<ol>\n<li><b><span data-contrast=\"auto\">The British police announced today (Thursday) that they are investigating a cybersecurity attack that hit 19 train stations throughout the kingdom, including some of the largest stations there.<br \/>\n<\/span><\/b><span data-contrast=\"auto\">Among others, the list includes London Bridge station, Houston station in the capital city, Manchester Piccadilly and Edinburgh Waverley. As part of the cyber-attack, passengers who tried to connect to the Wi-Fi network received messages that, according to the police, were Islamophobic.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Journalist Arrest in Cambodia<\/span><\/b><span data-contrast=\"auto\">: Journalist Mac Dara, who won awards for exposing the cyber industry and fraud in Cambodia, was arrested by the authorities following his reports on fraudulent operations based on identity theft (&#8220;Pig Butchering&#8221;) that also involve human trafficking. This activity involves creating a fake identity, establishing trust with the victim, and then tricking them into investing or borrowing money.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Significant software vulnerabilities<\/span><\/b><span data-contrast=\"auto\">: Jenkins, a popular automation tool, has released updates to fix serious vulnerabilities. In addition, an SQL vulnerability was discovered in Ivanti EPM, which was exploited against certain systems.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Charges against the Iranians<\/span><\/b><span data-contrast=\"auto\">: The US Department of Justice filed charges against three members of Iran&#8217;s Revolutionary Guard following targeted cyber-attacks against Donald Trump&#8217;s 2024 election campaign, which included stealing documents and attempting to distribute them to the press.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Cybersecurity attacks in the public and private sectors<\/span><\/b><span data-contrast=\"auto\">: Notable cyber-attacks occurred in the US, when an attack on the systems of several federal agencies was confirmed using unpatched weaknesses in the Ivanti EPM software, including the exploitation of a SQL vulnerability that led to data leakage and damage to local networks. In addition, reported attacks Ransomware that affected critical systems in Europe and the US, including health institutions and energy companies.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Shutting down a global botnet network<\/span><\/b><span data-contrast=\"auto\">: The FBI dismantled a network of infected computers, which contained about 19 million computers from 200 countries, which were used for financial fraud and other cybercrimes in the scope of billions of dollars. This operation is considered one of the most successful in the field of online crime recently.<\/span><\/li>\n<li><b><span data-contrast=\"auto\">Alerts of attacks on financial institutions<\/span><\/b><span data-contrast=\"auto\">: The International Monetary Fund (IMF) has warned of the increasing risk to financial institutions, with cyber-attacks in this sector posing a threat to global financial stability. According to the report, about 20% of the cyber-attacks reported in the last twenty years were in the financial sector.<\/span><\/li>\n<\/ol>\n<p><strong><em>The attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 40, 2024 Information security updates and events from the past week\u00a0 The British police announced today (Thursday) that [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[],"class_list":["post-9396","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9396","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=9396"}],"version-history":[{"count":1,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9396\/revisions"}],"predecessor-version":[{"id":9397,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/9396\/revisions\/9397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8579"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=9396"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=9396"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=9396"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}