All Articles (2537)

Sort by

10966778259?profile=RESIZE_400xBack in the 1960’s there was a popular American TV derived band called the Monkees.  Then in Australia, there was first ‘The Three Drunk Monkey’s’ – now it’s just called The Monkey’s.  The Monkey’s is a creative solutions company that create advertising, entertainment and technology products.  Monkey clients include The University of Sydney, Telstra, IKEA, UBank and Parmalat.   The Monkey’s are now working close with Telstra in a new device cyber security campaign.[1] 

When it comes to the cyber

10966752090?profile=RESIZE_400xWith the average cost of cars being close to buying a small house, auto financing is almost always required for most buyers.  Digital retailing is here to stay in the automotive industry, and it is growing exponentially.  While many think the auto industry is most worrying about getting inventory levels back to normal, their primary concern is fraud in digital retailing and the subsequent threat of profit erosion.   According to industry estimates, approximately one out of every five car buyers

10966651484?profile=RESIZE_400xWith many countries assisting Turkey and Syria in earthquake response, hackers are in the process of trying to disrupt the communication processes.  The Russian hacktivist collective Killnet has carried out a series of distributed denial of service (DDoS) attacks against NATO, causing temporary disruption to some of the military alliance’s public-facing websites.  The Killnet operation had previously said through its closed channel on the encrypted Telegram service that it was initiating attacks

10961706484?profile=RESIZE_400xWith Valentine’s Day quickly approaching, threat actors will be attempting to prey on individuals seeking companionship or romance.  Our friends at the NJCCIC continues to receive reports of sextortion incidents in which victims are threatened with the release of compromising or sexually explicit photos or videos if an extortion payment is not made.  Some sextortion threats are not credible, as threat actors are unable to provide proof of such photos or videos.  However, there is an increase in

10961632855?profile=RESIZE_400xAn information and hacking campaign, called Ghostwriter, with links to a foreign state has potentially had a "significant cumulative impact" over many years, according to a report from Cardiff University.  The findings, from the Security, Crime and Intelligence Innovation Institute, provide the most comprehensive picture to date of the activities of the so-called Ghostwriter campaign.

Tracking its evolving activities via open-source data, the report demonstrates how it has impersonated multiple

CISA Summary - Note: #StopRansomware is an CISA effort to publish advisories for network defenders that detail various ransomware variants and various ransomware threat actors.  These #StopRansomware advisories detail historically and recently observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware.  Visit stopransomware.gov to see all #StopRansomware advisories and to learn about other ransomware threats and no-cos

10961092070?profile=RESIZE_400xThe Russian hacking group known as 'Nodaria' (UAC-0056) is using a new information-stealing malware called 'Graphiron' to steal data from Ukrainian organizations.  The Go-based malware can harvest a wide range of information, including account credentials, system, and app data.  The malware will also capture screenshots and exfiltrate files from compromised machines.  Symantec's threat research team discovered that Nodaria has been using Graphiron in attacks since at least October 2022 through m

10961071257?profile=RESIZE_400xIf you have ever sat and read an entire insurance policy, you are fully aware of the use of specific words and definitions and how the words apply to the coverage.  The definition of “war” and “cyber-war” are at issue.  Property policies' war exclusions were designed to apply to any type of nation-state attack, including cyber events, insurers told a New Jersey appellate panel on 8 February in a battle over whether Merck has coverage for $1.4 billion in losses stemming from the 2017 NotPetya cyb

10960043274?profile=RESIZE_400x

 

UPDATE 2/9/2023: The balloon had equipment that was "clearly for intelligence surveillance," including "multiple antennas" that were "likely capable of collecting and geo-locating communications," according to a statement by a senior State Department official. The official said the balloon is likely part of a huge aerial spy program operated by the Chinese military that has targeted more than 40 countries on five continents with high-altitude surveillance balloons similar to one the U.S. sh

10960601287?profile=RESIZE_400xThe first Linux variant of the Clop ransomware was rife with issues that allowed researchers to create a decryptor tool for victims.  SentinelOne said it observed the first Clop (also stylized as Cl0p) ransomware variant targeting Linux systems on 26 December 2022.  Clop has existed since about 2019, targeting large companiesfinancial institutionsprimary schools and critical infrastructure across the world. After the group targeted several major South Korean companies like e-commerce giant E

10960040875?profile=RESIZE_400xOur friends at the State of NJ, NJCCIC has provided a valuable alert - Vulnerable VMware ESXi Servers Targeted in Ransomware Attacks.  

Ransomware groups are actively exploiting a 2-year-old heap-overflow vulnerability, CVE-2021-21974 (CVSS v3.1 8.8), affecting OpenSLP used in VMware ESXi servers for versions 6.x and prior to 6.7, though threat actors may be leveraging other vulnerabilities or attack vectors, as earlier builds of ESXi appear to have also been compromised.  European cybersecurity

10957476056?profile=RESIZE_400xFuture Shock was a book from the 1970’s that referenced what happens when people are no longer able to cope with the pace of change.  Whether you have noticed it or not, artificial intelligence (AI) is currently impacting every industry and almost every aspect of life.  AI-powered tools can now create legal documents, write reports and even teach you about a specific topic from a simple text prompt.   AI is even being used to assist with fraud detection, diagnose diseases and help with ensuring

10957409454?profile=RESIZE_400xWith historic inflation, rising prices, the escalating Ukraine conflict, and massive job losses in banking and tech, policymakers and executives are stretched to deliver a recovery agenda to get the world back to normal.

Most have little bandwidth for yet more problems to solve, like the impending perils faced by cyber threats.  Sadie Creese, a Professor of Cyber Security at the University of Oxford, said, “There's a gathering cyber storm and it's really hard to anticipate just how bad that will

10957305483?profile=RESIZE_400xA ransomware attack that hit ION Trading UK could take days to fix, leaving scores of brokers unable to process derivatives trades.  ION Group, the financial data firm's parent company, said in a statement on its website that the attack began last week.  "The incident is contained to a specific environment, all the affected servers are disconnected, and remediation of services is ongoing," ION Group said.  Ransomware is a form of malicious software deployed by criminal gangs which works by encry

10957340299?profile=RESIZE_400xA few weeks ago, Hackread.com reported about a malware-infected Android TV box available on Amazon: the T95 TV box.[1]  The box contained pre-installed malware, which was discovered by a Canadian developer and security systems consultant.   Now the same TV box is in the news again, and the person who has identified security threats is a Malwarebytes mobile malware researcher.  He purchased this device from Amazon to further probe and instantly realized something was off about this TV box.  He di

10953925294?profile=RESIZE_400xThe end of encryption, also called the “Cryptopocalypse,” is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption. Since public key encryption is used to secure almost all data in transit, both between separate IT infrastructures and even within individual infrastructures, that data will become accessible by anyone with a sufficiently powerful quantum computer. Shor’s algorithm is a quantum computer algorithm for finding the prime factors o

10953872879?profile=RESIZE_400xAs the volume of seaborne trade has continued to rise, congestion of trucks carrying freight in and around maritime ports has increased with it.  Long queues for these trucks are causing concerns for both port authorities and port operators.  These concerns include hardships imposed on truck drivers, disruption of traffic, environmental issues, and even degradation of a port’s brand.

What’s the answer?  Technology to keep the commodities moving. What could go Wrong?   Logistics provider, NEXT Tr

10954235293?profile=RESIZE_400xA pro-Russian hacking group is claiming responsibility for cyber-attacks on several hospitals in the United States.  The attack came just days after the Federal Bureau of Investigation (FBI) said it took down a ransomware group that was also targeting hospitals in what was called “The Hive” attack.

The US Attorney General says they’ve seen how cyber-attacks on medical facilities can be very disruptive.  “The Hive ransomware attack was able to prevent the hospital from accepting new patients,” th

10953410678?profile=RESIZE_400xLast week we presented a topic on our RedShort explaining the growing human engineering techniques; especially the use of cell phone calls.  The New Jersey NJCCIC recently detected an uptick in TOAD phishing campaigns. TOAD, or telephone-oriented attack delivery, is a type of social engineering attack that lures potential victims to contact fraudulent call centers managed by threat actors in attempts to steal credentials or install malware onto their systems.

The messages used in the observed TO

10953809075?profile=RESIZE_400xThe following article is based on the opinions of cyber threats and financial professionals and is not intended to place blame on any parties.  It is an important topic that has been brought to the attention of the US Government, even before the fall of the FTX Exchange.

See:  https://redskyalliance.org/xindustry/sec-chairman-pushes-for-more-cryptocurrency-regulations

The seemingly limitless innovations from information technology have created enormous opportunities for all kinds of predatory be