It has been alleged that the CIA has a secret, undisclosed data repository that includes information collected about Americans, two Democrats on the Senate Intelligence Committee said. While neither the agency nor lawmakers would disclose specifics about the data, the senators alleged the CIA had long hidden details about the program from the public and Congress. Senators Ron Wyden of Oregon and Martin Heinrich of New Mexico sent a letter to top intelligence officials calling for more details
All Articles (2788)
There is a dubious quote that has been allegedly attributed to Joseph Stalin, saying “It doesn’t matter how many people vote, only who counts them.” Voting integrity is a solemn guarantee in many countries. The US 2020 Presidential alleged election irregularities, using the Dominion voting machines, has caused serious doubts challenging voting integrity. A US federal cybersecurity agency is currently reviewing a report that alleges security vulnerabilities in voting machines used by Georgia a
Online banking and online shopping are useful and convenient, but using them insecurely can put you at risk from hackers. Here are some suggestions to keep your money and cryptocurrency more secure against online threats. In the 21st Century, we are all much more reliant on the internet and online services than ever before. The Internet age has brought benefits, it is easy and convenient to buy from a website compared with having to visit a store and there are also additional risks that need t
If you or your company was unfortunate enough to be caught in the web of a ransomware attack, the consequences may have been devastating. Hopefully you got rid of the infection, but the all-important files affected by such an attack could still be under lock and key. Without backups, which is more common than you may think, the files may be gone forever.
A tiny slice of good fortune: Occasionally, we all catch break. Files can sometimes be recovered in the following ways[1]:
- A ransomware aut
Cyber threat actors are introducing new services to expand their “Client” base. The Pay-per-Install (PPI) distribution model is based on revenue sharing and commissions. The PPI model was initially used to distribute advertisements but is has transitioned to install malware. Malware authors do not have the resources or bandwidth to spread their malware on a large scale. Instead they can rely on a network of affiliates, who distribute the malware, and in return get paid a commission for every
The Microsoft Security Intelligence team is warning that Office 365 customers are receiving phishing emails that aim to trick them into giving OAuth permissions to a bogus app that then lets attackers read and write emails. The team reported that attackers are sending the OAuth phishing emails to "hundreds" of Office 365 customers.
OAuth is an open standard for access delegation, commonly used as a way for Internet users to grant websites or applications access to their information on other we
Activity Summary - Week Ending on 11 February 2022:
✓ Red Sky Alliance identified 14,657 connections from new IP’s checking in with our Sinkholes
✓ Amazon IP hit – this time in France
✓ Analysts identified 6,580 new IP addresses participating in various Botnets
✓ Emotet still being Used
✓ ShuckWorm
✓ Dark Herring
✓ LockBit 2.0
✓ VodaFone Attack
✓ $94,000 Bitcoins Seized
✓ Drones used to Attack Networks
✓ CapraRAT and Earth Karkaddan
Link to full report: IR-22-042-001_weekly042.pdf
The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), and the United Kingdom’s National Cyber Security Centre (NCSC) issued a joint Cybersecurity Advisory outlining the growing international threat posed by ransomware over the past year.
The advisory titled “2021 Trends Show Increased Globalized Threat of Ransomware”[1] outlines top trends seen across three nation
The operators of the GootLoader campaign are targeting employees of accounting and law firms as part of a renewed effort of cyberattacks to deploy malware on infected systems. This is an unfortunate sign that the adversary is expanding its focus to other high-value targets. The Gootkit malware family has been around for five years or more, and is used to distribute code such as ransomware, which can encrypt the files on a Windows computer and only release them once a ransom is paid.
Gootloader
Red Sky Alliance has been building our dark web data collection since late January 2021. With it, we are able to make dark web content available without the need for analysts to touch the dark web to visit Tor .onion sites. To date, we have over 1.3 million data points on over 75 sites and we are adding new sites regulary. The dark web sites that we collect from evolves over time as new sites come and older sites shut down, but we maintain a historical record of those decommissioned sites. Lastl
In separate reporting, the “metaverse” could be a serious problem for children worldwide. If there is only one thing that technology companies, retailers, content creators and investors can agree upon, is that there is money to be made from the metaverse. The metaverse is planned as a virtual-reality space in which users can interact with a computer generated environment and other users.[1] As technology CEOs try to win a market position in the still developing digital space, some psychologis
The European Central Bank is preparing banks for a possible Russian-sponsored cyber-attack as tensions with Ukraine mount as the region braces for the financial fallout of any conflict. The stand-off between Russia and Ukraine has rattled Europe's political and business leaders, who fear an invasion that would inflict damage on the entire region.
Earlier this week, French President flew to Moscow, then to Kyiv Ukraine in a bid to act as a mediator after Russia massed troops near Ukraine.[1] N
Cyber threat actors are now using socially engineered emails with .ppam file attachments that hide malware that can rewrite Windows registry settings on targeted machines to take over an end user’s computer, researchers have found. It is one of a number of stealthy ways threat actors recently have been targeting desktop users through trusted applications they use daily, using emails that are designed to evade security detections and appear legitimate.
New research from Avanan https://avanan.co
It is estimated that North Korea (KP) is continuing to steal hundreds of millions of dollars from financial institutions and cryptocurrency firms and exchanges. This stolen currency is an important source of funding for its nuclear and missile programs, UN experts said in a report quoting cyber specialists. The panel of experts said that according to an unnamed government, North Korean “cyber-actors stole more than $50 million between 2020 and mid-2021 from at least three cryptocurrency exchan
Merchant tanker and barge shipments in and out of Europe’s biggest oil hub have been delayed by up to a week as four storage companies work to resume operations after cyber-attacks. Since the end of last week, storage company Oiltanking and oil trading firm Mabanaft, both owned by Germany’s Marquard & Bahls, have been hit by hackers. Belgium’s SEA-TANK and Dutch fuel storage firm Evos have also been affected.
The companies have had to suspend some operations, affecting oil flows in the Netherl
Scientists and technology visionaries have envisioned a day when computers become so powerful that they become smarter than the human race. There is no shortage of science fiction stories and movies about robot uprisings. We are still far from that scary scenario (we hope), but at the same time, artificial intelligence (AI) is no longer sci-fi. Many applications of AI abound today in business and it is now being used in some creative professions.
New behavioral experiments by Alok Gupta from the
German car dealers and distributors have found a new use for blockchains: acquiring and financing their customers quickly and with less paperwork than traditional bank loans. Using Ethereum smart contracts – computer protocols that facilitate, verify or enforce the negotiation of an agreement – dealerships can provide their clients with immediate access to fiat currencies through dealer credit applications. But this family-owned dealership has embraced the blockchain by incorporating cryptocur
The Conti gang strikes again, disrupting the grocery store supply chain and threatening supermarket shelves that could stay empty for weeks. KP Snacks, maker of the high-end Tyrrell’s and Popchips potato-chip brands, has suffered a ransomware attack that it said could affect deliveries to supermarkets through the end of March 2022 at the earliest. For our US readers, Brits call potato chips, crisps. You say potato; I say potaaato.
The British company said that the Conti gang was behind the s
The concept of computer security has only recently shifted from individual services, such as installing and operating virus and network firewalls on individual terminals, to interconnected and integrated services. These interconnected and integrated services aid organizations in not only terms of functionality but also efficiency. The need for and importance of endpoint security was demonstrated in 2003 by the SQL Slammer worm (which caused extensive damage to network systems).
The SQL Slammer w
A 19-year-old security researcher said he was able to hack into over 25 Teslas from around the world. Recently the young hacker published a blog post explaining how he was able to remotely hack into the cars via security bugs in TeslaMate, a popular open source logging tool that tracks anything from the Tesla's energy consumption to location history. The teenager hails from Dinkelsbühl, Germany and first revealed news of the vulnerability on Twitter earlier in January, but waited to fully deta