FBI’s investigation accidentally revealed the HelloKitty ransomware gang operates out of Ukraine
While investigating a data breach suffered by a healthcare organization, FBI accidentally revealed that it believes that the HelloKitty ransomware gang operates out of Ukraine. The investigation conducted by FBI […]
Crooks injects e-skimmers in random WordPress plugins of e-stores
Threat actors are injecting credit card swipers into random plugins of e-commerce WordPress sites, Sucuri researchers warn. Sucuri researchers are warning of threat actors injecting credit card swipers into random […]
Nobelium APT targets French orgs, French ANSSI agency warns
The French cyber-security agency ANSSI said that the Russia-linked Nobelium APT group has been targeting French organizations since February 2021. The French national cybersecurity agency ANSSI (Agence Nationale de la […]
FBI training document shows lawful access to multiple encrypted messaging apps
Which are the most secure encrypted messaging apps? An FBI document shows what data can be obtained from them. The Record shared an FBI training document that reveals the surveillance […]
Experts warn of attacks exploiting CVE-2021-40438 flaw in Apache HTTP Server
Threat actors are exploiting the recently patched CVE-2021-40438 flaw in Apache HTTP servers, warns German Cybersecurity Agency and Cisco. Threat actors are exploiting a recently addressed server-side request forgery (SSRF) […]
SOAR Into More Integrated Cybersecurity
By Josh Magady, Section Manager, Senior Cybersecurity Consultant, and Practice Technical Lead, 1898 & Co. Why is being cybersecurity compliant not the same as preparedness for threats? Shouldn’t compliance mean full […]
The rise of millionaire zero-day exploit markets
Researchers detailed the multi-millionaire market of zero-day exploits, a parallel economy that is fueling the threat landscape. Zero-day exploits are essential weapons in the arsenal of nation-state actors and cybercrime […]
Multicloud Rolls In: Federal IT Professionals Share Insights and Challenges
By Rick Rosenburg, Vice President and General Manager, Rackspace Government Solutions, Rackspace Technology Federal agencies kicked into IT modernization overdrive during the pandemic and, as 2022 approaches, agencies are looking […]
Android.Cynos.7.origin trojan infected +9 million Android devices
Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on Huawei’s AppGallery catalog (i.e. simulators, platformers, arcades, strategies, and shooters) […]
Five Cloud Telephony Security Vulnerabilities That Can Threaten Your Business
The Flip Side of Using Cloud Telephony Services By Sujan Thapaliya, CEO and Co-Founder, KrispCall It is evident that VoIP will be the future of business communications. Historically, it has […]
Attackers deploy Linux backdoor on e-stores compromised with software skimmer
Researchers discovered threat actors installing a Linux backdoor on compromised e-commerce servers after deploying a credit card skimmer into e-stores. Security researchers from Sansec Threat Research Team discovered a Linux […]
What To Know to Fight Against Cyber Attacks
By Gergo Varga, Senior Content Manager / Evangelist at SEON Cyber attacks have become a part of our reality, not only that we are all constantly getting phishing emails, but […]
Digital Transformation Security: Guidelines for Success
By Yehudah Sunshine, Head of PR, odix With the workforce going remote and IP existing almost exclusively in the digital domain enterprises, local and federal agencies, and SMBs alike are […]
Ransomware attack disrupted store operations in the Netherlands and Germany
Electronics retail giant MediaMarkt was hit by a ransomware attack that disrupted store operations in the Netherlands and Germany. Electronics retail giant MediaMarkt was a victim of a ransomware attack that forced […]
Electric Vehicle Charging: The Next Cyberattack Frontier
By Prof. Thomas R. Köhler, Member of the Board of Juice Technology AG The International Energy Agency estimates the global number of electric cars, buses, vans and heavy trucks on […]
Trojan Source attack method allows hiding flaws in source code
Researchers devised a new attack method called ‘Trojan Source’ that allows hide vulnerabilities into the source code of a software project. Trojan Source is a new attack technique demonstrated by […]
Pink Botnet infected over 1.6 Million Devices, it is one of the largest botnet ever seen
Cybersecurity researchers uncovered a huge botnet, tracked as Pink, that already infected over 1.6 million devices most of them located in China. Qihoo 360’s Netlab Cybersecurity researchers discovered a huge […]
5 Recommendations to Prevent Man in the Middle Attacks (MITMA’s) within the Financial Sector.
MITMA’s stands for Man in The Middle Attacks, and is the term used to describe one the oldest but still exceptionally popular forms of attack. In this attack, a hacker […]
AbstractEmu, a new Android malware with rooting capabilities
AbstractEmu is a new Android malware that can root infected devices to take complete control and evade detection with different tricks. Security researchers at the Lookout Threat Labs have discovered a new Android malware, […]
Ranzy Locker ransomware hit tens of US companies in 2021
The FBI published a flash alert to warn of the activity of the Ranzy Locker ransomware that had already compromised tens of US companies. The FBI published a flash alert […]
NATO releases its first strategy for Artificial Intelligence
This week, NATO Defence Ministers released the first-ever strategy for Artificial Intelligence (AI) that encourages the use of AI in a responsible manner. Artificial Intelligence (AI) is changing the global […]
Protecting SMBs from Current Cybersecurity Threats
A Few Small Practices Can Have a Large Impact By Mike Mosher, Director of Technology, Cinch I.T. If you own a small or medium-sized business, you are a target of […]
Trustwave released a free decryptor for the BlackByte ransomware
Trustwave’s SpiderLabs researchers have released a free decryptor for the BlackByte ransomware that can allow victims to recover their files. Researchers from Trustwave’s SpiderLabs have released a decryptor that can […]
Why NDR? See the Entire Elephant in the Room
By Aimei Wei, Chief Technical Officer (CTO) and Founder Network detection and response (NDR) has a long history, evolving out of network security and network traffic analysis (NTA). The historical […]
Application Modernization and Other Best Practices of Securing Legacy Infrastructures
By Roman Davydov, Technology Observer, Itransition Legacy systems continue to play a vital role in the operations of many enterprises. However, over time, things like poor user adoption, increased maintenance […]
Olympus US was forced to take down computer systems due to cyberattack
Olympus US was forced to take down IT systems in the American region (U.S., Canada, and Latin America) following a cyberattack. The medical technology giant Olympus was forced to shut […]
The Top 6 Cyber Attacks Of 2021 So Far
By Nicole Allen, Marketing Executive, Salt Communications. Cyberattacks have been on the rise for years, and the trend shows no signs of slowing down. To add salt (no pun intended) […]
Threat actors exploit a flaw in Coinbase 2FA to steal user funds
Threat actors stole funds from the accounts of more than 6,000 users of the crypto exchange Coinbase exploiting a flaw to bypass 2FA authentication. Threat actors have exploited a vulnerability […]
Russia-linked Nobelium APT group uses custom backdoor to target Windows domains
Microsoft discovered new custom malware, dubbed FoggyWeb, used by the Nobelium cyberespionage group to implant backdoor in Windows domains. Microsoft Threat Intelligence Center (MSTIC) researchers have discovered a new custom […]
Port of Houston was hit by an alleged state-sponsored attack
Last month, the Port of Houston, one of the major US ports, was hit by a cyber attack allegedly orchestrated by a nation-state actor. One of the major US ports, […]