This week in the news:
- Cyberattack Disrupts SETU Waterford Campus, Forcing Class Cancellations
- Ireland’s NCSC Reports Successful Cybersecurity Efforts in 2023 Annual Update
- Pro-Russian Hackers Target UK Local Authorities in Cyber Attack Wave
- UK Businesses Face Mounting Supply Chain Cybersecurity Challenges
- New FakeCall Malware: A Sophisticated Threat to Android Users’ Financial Security
- Interpol’s Operation Synergia II Deals Major Blow to Global Cybercrime
- Windows Server 2025 Faces Critical Install and Blue Screen Issues
- Critical Zero-Click Vulnerability in Synology NAS Devices
- Emulated Linux Environment Used to Conceal Malicious Cyber Activity
- Critical Security Alert for Nvidia GeForce Users
Cyberattack Disrupts SETU Waterford Campus, Forcing Class Cancellations
South East Technological University’s Waterford (SETU) campus has been hit by a significant cyberattack, leading to the cancellation of classes and severe disruption of IT services. The incident, which targeted the university’s IT systems, has left the campus without internet access, internal email capabilities, and other online facilities.
SETU officials have stated that the attack was identified early and that their IT team acted swiftly to safeguard systems.
While there is currently no evidence of data compromise, the full extent of the damage remains unknown.
The attack has only affected the Waterford campus, with other SETU locations continuing normal operations.
Staff have been advised to prepare for teaching without internet connectivity, and the Teachers Union of Ireland has recommended using home computers for class preparation.
View SourceIreland’s NCSC Reports Successful Cybersecurity Efforts in 2023 Annual Update
The National Cyber Security Centre (NCSC) of Ireland has released its Annual Update for 2023, revealing significant progress in the country’s cybersecurity efforts.
Out of 5,276 reports received, 721 were confirmed as cybersecurity incidents, leading to 309 investigations.
Notably, the majority of these incidents were classified at the lower end of the severity scale, with no incidents reaching the top two severity categories. This outcome is attributed to the NCSC’s effective preventative measures in safeguarding state infrastructure.
View SourcePro-Russian Hackers Target UK Local Authorities in Cyber Attack Wave
Portsmouth City Council has become the latest victim in a series of cyber attacks targeting UK local authorities.
The council reported being affected by a distributed denial-of-service (DDoS) attack orchestrated by a group calling itself NoName057(16), which has been linked to pro-Russian hackers. This attack is part of a broader campaign that has also impacted other councils, including Salford and Middlesbrough.
Despite the disruption to their website, Portsmouth City Council assured residents that no council services were affected and that personal data remained secure.
The council is actively working to resolve the issue and has maintained alternative channels for residents to access services and make payments.
The National Cyber Security Centre (NCSC) has acknowledged the attacks and is providing guidance to affected councils, noting that while DDoS attacks are relatively unsophisticated, they can cause significant disruption to online services.
View SourceUK Businesses Face Mounting Supply Chain Cybersecurity Challenges
A recent study revealed that an overwhelming 95% of UK organisations experienced supply chain cybersecurity incidents in the past year, with 59% reporting between 2 to 5 incidents.
Although 92% of respondents reported an increase in budget for managing risk, the priority given to third-party cybersecurity risk management has slightly decreased.
The study also highlighted a decline in supply chain monitoring and visibility, with only 34% of businesses monitoring third-party supplier risk monthly or more frequently, down from 46% in 2023. This lack of regular monitoring has left 34% of firms unable to detect when a cyber incident occurs.
The primary reasons for this visibility gap include a lack of expertise, technology, and resources, with 57% of firms admitting they don’t assess all vendors.
View SourceNew FakeCall Malware: A Sophisticated Threat to Android Users’ Financial Security
Cybersecurity researchers have uncovered a new variant of the FakeCall Android malware, which employs advanced voice phishing techniques to compromise users’ personal and financial information. This sophisticated malware takes extensive control of infected devices, intercepting calls and mimicking legitimate user experiences.
FakeCall can capture a wide range of sensitive data, including SMS messages, contact lists, and location information, while also capable of taking pictures, recording audio, and even live-streaming device activities. What makes this variant particularly dangerous is its ability to set itself as the default dialer app, allowing it to monitor and manipulate all incoming and outgoing calls. The malware can redirect calls intended for banks to fraudulent numbers controlled by attackers, displaying a convincing fake UI that mimics the genuine Android call interface.
View SourceInterpol’s Operation Synergia II Deals Major Blow to Global Cybercrime
Interpol’s recent Operation Synergia II has delivered a significant strike against international cybercrime, resulting in the takedown of over 22,000 servers and IP addresses linked to various cyber threats.
The operation, which ran from April to August 2024, involved law enforcement agencies from 95 countries and led to the arrest of 41 individuals, with 65 others under investigation.
Targeting phishing, ransomware, and information stealers, the operation seized 59 servers and 43 electronic devices.
Interpol reported a 40% increase in infostealer data sales and a 70% rise in global ransomware attacks last year, highlighting the growing sophistication of cybercriminals, particularly in using AI for creating more convincing phishing emails.
View SourceWindows Server 2025 Faces Critical Install and Blue Screen Issues
Microsoft has confirmed multiple issues impacting Windows Server 2025, including Blue Screen of Death (BSOD) errors and prolonged install times on systems with more than 256 logical processors.
Affected users may experience long restarts, failed installations, and app crashes. Microsoft advises admins to limit logical processors to 256 until a fix is released in an upcoming monthly update.
View SourceCritical Zero-Click Vulnerability in Synology NAS Devices
Synology has issued an urgent patch for a critical zero-click vulnerability (CVE-2024-10443) affecting its DiskStation and BeeStation NAS devices.
Known as RISK, this flaw could allow attackers to remotely execute code and gain root access without user interaction.
Users are strongly advised to install the latest updates to protect their data, as this vulnerability impacts millions of devices worldwide.
View SourceEmulated Linux Environment Used to Conceal Malicious Cyber Activity
Cybersecurity researchers have identified a sophisticated cyberattack dubbed CRON#TRAP, where attackers use an emulated Linux environment within QEMU to hide their activities on compromised systems.
Through a phishing campaign, attackers deploy this virtualised setup to avoid detection, allowing them to execute commands and exfiltrate data stealthily. Notable for targeting North America, this method demonstrates a new level of persistence, leveraging tools like SSH keys for ongoing access.
View SourceCritical Security Alert for Nvidia GeForce Users
Nvidia has identified eight high-severity vulnerabilities in its GeForce GPU display drivers, affecting GeForce, RTX, Quadro, NVS, and Tesla models on both Windows and Linux.
These flaws could allow hackers to access entire systems, execute malicious code, and steal data.
To protect your system, Nvidia urges users to update to the latest driver versions, including 566.03 for Windows and multiple versions for Linux. Visit Nvidia’s site or use the GeForce Experience app to download the latest security patches.
View SourceIf you would like to discover how Secora Consulting can assist you in keeping your business secure, please get in touch by filling out the form below 👇.