top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #140 - March 10, 2025

X suffered a DDoS attack. Its CEO and security researchers can’t agree on who did it.

Source: CyberScoop

X’s wave of outages resembled a DDoS attack and Dark Storm Team, a prolific threat group specializing in such attacks, claimed responsibility. Social media service X was hit by a series of distributed denial-of-service attacks Monday, which rendered the platform formerly known as Twitter inaccessible at times for users with intermittent outages and errors, according to researchers.




GitHub-Hosted Malware Infects 1M Windows Users

Source: Dark Reading

A broad malvertising campaign used a combination of illegal streaming websites and GitHub to impact nearly 1 million Windows PCs with data-stealing malware. The campaign, identified by Microsoft, targeted both consumer and enterprise devices across a wide range of industries and organizations.




BianLian ransomware wanna-bes are targeting business execs using the actual mail, FBI says

Source: CyberNews

In a ransomware first, threat actors claiming to be from the BianLian ransomware gang have been found using the regular US postal service to try and extort money from corporate executives, the FBI warned on Thursday.




CISA: Medusa ransomware hit over 300 critical infrastructure orgs

Source: Bleeping Computer

CISA says the Medusa ransomware operation has impacted over 300 organizations in critical infrastructure sectors in the United States until last month. This was revealed in a joint advisory issued today in coordination with the Federal Bureau of Investigation (FBI) and the Multi-State Information Sharing and Analysis Center (MS-ISAC).




Popular Voice Cloning Tools Lack Safeguards

Source: Data Breach Today

Need a new voice? Artificial intelligence has you covered. Need to protect your own? That's another story. Some of the most widely used AI voice synthesis tools offer only superficial safeguards against misuse - if any at all, researchers found in a recent analysis.



 
 

Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page