Weekly Unfoldings: September 16-21, 2024

5 min read
Weekly Unfoldings: September 16-21, 2024

Stay informed with our weekly roundup of top 10 key happenings in tech, cyber, and geopolitics. Discover the most significant developments, trends and breakthroughs shaping the industry, all in one concise update. The card image tiles are designed for easy recognition of the category to which the news belongs.

💡
The links provided in this content direct to third-party websites. We do not control or endorse the content on these external sites, and therefore cannot guarantee the accuracy, completeness, or reliability of the information they provide. We are not affiliated with these sites, and any opinions or claims made on them are solely those of the respective site owners. Users are encouraged to verify the information independently before relying on it.
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
International Crackdown: ‘Ghost’ Cybercrime Platform Shut Down, Dozen Arrested

An international law enforcement operation ha dismantled Ghost, an encrypted platform used for drug trafficking and money laundering. Europol announced 51 arrest across multiple countries, with more expected. The operation disrupted criminal networks, thwarted threat to life, and led to seizure of drugs, weapons, and over €1 million in cash, marking a major victory against organized crime.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Supreme Court of India YouTube Channel Hacked, Crypto Content Replaces Key Court Proceeding

The Supreme Court of India YouTube channel wa hacked on September 20, 2024, replacing court proceedings with unauthorized cryptocurrency content about XRP. Archived video were set to private, and a live stream about Ripple Lab aired instead. The breach raised security concern, as it disrupted important hearing, including the Krishna Janmabhoomi-Shahi Idgah dispute and other high-profile case.

Read more
6ae6f973-670d-4513-b250-b3ee1a48abc2.png
Hackers Exploit Default Credentials in FOUNDATION Software to Breach Construction Firm

Threat actor are targeting the construction sector through FOUNDATION Accounting Software, using default credentials to brute-force access. Affected industrie include plumbing, HVAC, and concrete. The MS SQL Server used by the software expose TCP port 4243, enabling attacker to run arbitrary shell command. To mitigate risk, change default credentials, limit public access, and disable the xp_cmdshell feature.

Read more
389837bf-7a05-4fa4-8d2b-af0a9a490dc2.png
Europol Shut Down Major Phishing Scheme Targeting Mobile Phone Credentials

Law enforcement dismantled a global criminal network using the iServer phishing platform to unlock stolen mobile phone, with over 483,000 victim targeted. Operation Kaerb led to 17 arrest and exposed 1.2 million compromised phone. The Ghost encrypted communication platform, used by criminal for drug trafficking and money laundering, wa also taken down, with 51 suspect arrest globally.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Empty Steppes: An Examination of Mongolia Ukraine Policy

In an interview with Tucker Carlson, Ruian President Vladimir Putin claim over Ukraine based on historic border sparked backlash, including from former Mongolian President Tsakhia Elbegdorj. Despite initial support for Ukraine, Mongolia ha remained neutral due to it geopolitical reliance on Ruia and China. Mongolia balanced relation make it a potential candidate for facilitating peace talk between Ruia and Ukraine.

Read more
769adb45-eb2d-4bf7-bfb1-733a5fbaec96.png
Kazakhstan Foreign Policy a a Model for Stability in an Unstable World

A the UN World Peace Day approach on 21 September, global conflict ecalate, notably the Ru-Ukraine war and tension in the Middle Eat. Kazakhstan balanced, multi-vector foreign policy exemplifie how smaller nation can navigate a multipolar world, fostering diplomacy and stability. It commitment to neutrality and dialogue offer a potential model for peace amid riing geopolitical tension.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
Microsoft launch a Windows app for iPhone, Mac, and Android device

Microsoft ha launched a new Windows app compatible with macOS, iOS, iPadOS, web browser, Android, and Windows PC. Thi app serve a a hub for streaming Windows from source like Windows 365 and Azure Virtual Dektop. It feature a customizable homescreen, multi-monitor support, and USB redirection, but i limited to Microsoft work and school account. The app i now available in variou app store.

Read more
f9adefe8-310d-4587-9af7-d1704a2d3c83.png
The FTC ay social media companie cant be trusted to regulate themelve

The FTC recent report on social media and video streaming platform reveal alarming data collection practice, including indefinite retention of user data and urveillance of non-user. It criticize self-regulation a ineffective and highlight the industry profit-driven model a detrimental to privacy and safety, particularly for minor. The FTC call for comprehensive privacy legislation and urge companie to adopt stricter data collection policie.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
aica launch Edge Device Portal, with application for pilot customer now open

aica ha introduced it Edge Device Portal (EDP), inviting companie to join the “Be an EDP Pioneer” pilot program for early acces. Thi cloud-based solution implifie management of diverge edge device, enabling flexible update and configuration without downtime. Suitable for industrie like industrial automation and smart mobility, EDP enhance real-time operation and support eamless application management. Intereted companie can apply by the end of October.

Read more
6f7520b7-ef3f-48cf-ace3-3b442c0e516c.png
China-linked IoT botnet Raptor Train uncovered

A maive IoT botnet named Raptor Train, operated by state-sponsored Chinese actor Flax Typhoon, ha compromised over 200,000 device, including router and IP camera. Managed through ophiticated command and control infrastructure, it enable scalable exploitation and potential future DDoS attack. Lumen Technologie ha acted to null-route the botnet traffic and iued threat intelligence to afeguard against thee cyber threat.

Read more

Want to write a blog?

Unfold your thoughts and let your ideas take flight in the limitless realm of cyberspace. Whether you're a seasoned writer or just starting, our platform offers you the space to share your voice, connect with a creative community and explore new perspectives. Join us and make your mark!

Follow us on social media

Cyber Unfolded Light Logo
Copyright © 2024 CYUN. All rights reserved.